Most of them are phone dependent though. Would be nice if sites did offer non phone options. I have seen some that use email though. That's fine, since it's device agnostic, no propriety app to install. Ideally it would be nice if they just use some sort of standard instead of their own app. I want something that I can easily back up that runs on PC. Not some black box app that stores data who knows where or how.
Ok, what your talking about here is a couple things, using the term "most" is subjective too. "most" of mine are not setup thru SMS.
1. SMS 2FA - I agree this is the worst option, and the mostly like to be compromised. You're not describing compromising it. Very few of my accounts are SMS 2FA. It's still better than nothing.
2. proprietary app - I really am not sure what you referring to. I have used a few different 2FA apps, none of which were required for a particular account or config. Feel free to elaborate, as I'm always up for learning more about what other's are required to do.
3. I mainly use Authy as my 2FA app. It's runs on both my phone and desktop.
4. I use Safe In Cloud as my password manager. It gives me the flexibility I'm looking for without my account info being stored on a particular vendors website (such as LastPass). The account this is sync'd to is 100% locked down as hard as configurable. Very long password, 2FA enabled. Even in the event, however unlikely, this account the database is sync'd to is compromised....the Safe in Cloud database is still 256 bit AES encrypted. A Bad actor would still require my database password to unlock it. This is another unique password that is NOT written anywhere, only I know it.
I think the most likely way for 2FA to be exploited is through a vulnerability in the site itself and not an individual device though. If they're going to try to hack that they'll go for the gold. Ex: a way to just bypass it altogether. In an ideal scenario this cannot happen, but nothing is 100% secure. I imagine most sites have some way to recover your account if you lose or change your phone, so that would probably be the main attack surface.
So not really a failure of 2FA itself, but lackluster security on a website. This is plausible, as we've seen time and time again.
We touched on most 2FA's here except for HSK's like yubikey.
As for password manager I ended up writing my own, I wanted something that is web based, but self hosted, couldn't find anything, so wrote it. It's probably not super secure compared to something written by cryptography experts but if someone gains access to it it means they're on my network so I have bigger issues to worry about. Whatever time it takes to brute force AES256 should buy me enough time to change all my passwords if they did in fact manage to get the database.
Right, gotta accept your own level of risk.