Google authenticator is what I'm using and I do it like you do as well by having it in another device. It's risky having it on the same device. If you lose the device, the person who stole it will have access to everything.Oh yes I make use of it, especially in sensitive applications and softwares. Then I make sure the authentication is on another device.