This isn’t strictly a privacy question as a security one, so I’m asking this in the context of individuals, not organizations.

I currently use OTP 2FA everywhere I can, though some services I use support hardware security keys like the Yubikey. Getting a hardware key may be slightly more convenient since I wouldn’t need to type anything in but could just press a button, but there’s added risk with losing the key (I can easily backup OTP configs).

Do any of you use hardware security keys? If so, do you have a good argument in favor or against specific keys? (e.g. Yubikey, Nitrokey, etc)

  • jet@hackertalks.com
    cake
    link
    fedilink
    English
    arrow-up
    3
    ·
    4 months ago

    Yubikey bio has a fingerprint reader built into it. Which is very nice. Even if the device you’re using is compromised you will never expose your pin.

    The only key also has that advantage.

      • jet@hackertalks.com
        cake
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 months ago

        External entry of the pin, means you avoid compromising it on a compromised computer.

        • Gooey0210@sh.itjust.works
          link
          fedilink
          arrow-up
          2
          ·
          4 months ago

          It really depends on your thread model

          In my opinion the fingerprint won’t do any difference anyway

          Who are we protecting against?

          Hackers? They can’t press the button

          Thieves? They don’t have your pin

          Someone close who knows your pin? Maybe, but this is really an overkill

          Evil maid? If somebody can pull up evil maid attack, they can hack the fingerprint anyway

          Governments? They hack or force you to unlock it anyway


          Summary: my opinion is that fingerprint is an overkill which doesn’t protect from any real thread, but costs more and lacks some functions

          • jet@hackertalks.com
            cake
            link
            fedilink
            English
            arrow-up
            1
            ·
            4 months ago

            If I compromise your system. I can record the pin. Then I just need to steal the device.

            • Gooey0210@sh.itjust.works
              link
              fedilink
              arrow-up
              1
              ·
              4 months ago

              Think, who are you, and who am i?

              I mean, how would you do it, and just why?

              This is a very very very improbable scenario, too complicated, and too unlikely

              There could be a thread model that would work with this feature well, but I don’t think any of us even theoretically is one of those people that would benefit from it

              Define your thread model, and work from it

              Most of the people have two main threads: hackers, and thieves, not hacker-thieves