Security tools deserve transparency and better design.
There are several great authenticator solutions, including these five.