Thoughts on Yubikey?

Thoughts on Yubikey?

Attached: DB1BC3E2-49D6-4DFE-A4E1-7B6342330D7E.png (1000x1000, 962K)

Other urls found in this thread:

crowdsupply.com/sutajio-kosagi/tomu
tedunangst.com/flak/post/using-yubikeys-everywhere
youtube.com/watch?v=ugD-YxDuSX8
twitter.com/NSFWRedditVideo

Botnet

How so

non-free fag

my laptop is encrypted, has a firmware admin password and also custom secureboot PK, KEK and db and I only run db signed efi applications.

what fucking value am I going to get from some meme smartcard/tpm bullshit that I couldn't get running whatever crapware on my laptop directly?

crowdsupply.com/sutajio-kosagi/tomu

ya ya ya ya now go fuck yourself

>make actual points about trusting your security on a propitiatory product a black box you don't know about, proceed to shit on people


shill

>$100 goal
so it's a marketing strategy

just build one yourself the parts list is there.

Seems interesting, though quite expensive.

Here is an article that talks about using them for different cases.
tedunangst.com/flak/post/using-yubikeys-everywhere

What are they used for

Shiet that's nice

Work has me use one
No idea what it does / how it works I just push the thing to log in

youtube.com/watch?v=ugD-YxDuSX8
Yubikeys are alright, but fucking annoying on Windows 10.

I have one. It's pretty cool, but I don't have enough stuff to use it with. It's really just Github (which I don't even use) and a weeb porn torrent tracker. I hear there's ways to integrate it with your PGP and SSH keys but I haven't looked into it yet.

You can get one for $10 if you buy a subscription to wired

cute
I wished they used some kind resin for the back though, would be easy to short the caps on the port chassis, especially when pushing it around.

>razer laptop

Opinion and study disregarded

I have the neo and use the shit out of it. It will hold an oath-Totp code on slot one for stuff like last pass or google u2f. Slot two holds a static password that I use for logging into a machine and admin tasks. Slot one is also readable over nfc so I can just touch my phone to it to use u2f on a bunch of different apps. If you do a lot of shit with security or security research they are pretty indispensable.

I’ve also washed it, stepped on it, dropped it, kicked it, etc and it can’t be killed.

I'm skeptical. We have them at work. The fact that they just act like a USB keyboard really seems like a weak point. I've wondered if you compromised a kernel how hard it would be to just log the key, do something malicious and then wait for the user to keep slamming the key think it missed the key press.

Honestly I don't like them but that has more to do with all of the retarded security shit that I saw ushered in with them. So I'm probably irrationally biased.

Attached: 1532550925228.jpg (660x680, 55K)

Hard counters phishing with U2F.

The private key is never shared, it's only used as a challenge-response.

Fido standard is open.

Nobody in their right mind uses Windows 10. I think most companies are still on Windows 7.