I rarely use my smartphone and find it a bit annoying to have to use it for 2FA through apps. I wish to get physical passkeys that will allow me to login to my laptop.

I have heard of YubiKey although I haven’t given it any serious consideration since it is closed source. (My super-tin-foiled friend who introduced me to this world of privacy taught me to never trust a closed-source solution… _long _ story).

Are there any FLOSS versions of Yubikey? Can they be used to log into a Linux machine? Or for banking?

28 points

I believe that NitroKeys are open-source. The New Oil did a video covering them.

permalink
report
reply
14 points

Yes they are - I own 3. Currently Nitrokey offers multiple different keys, but you most likely want to use the Nitrokey 3A.

permalink
report
parent
reply
19 points

There is SoloKey, which is an open-source version of YubiKey. Although full disclosure, I haven’t actually tried it myself so I can’t really vouch for it personally.

permalink
report
reply
4 points

Yeah done anything with it over 1.5 ~ 2 years, on top of that NFC does not work at all in many cases.

Yeah I regreted buying one . . . works great on PC though.

permalink
report
parent
reply
16 points

(Disclaimer: I work there)

Check out @nitrokey. we make Open Source software and hardware security keys that have pretty similar functionality with Yubikeys.

#Fido #PGO and in progress #PIV

permalink
report
reply
4 points

nice, any downsides or issues a yubikey user looking to buy nitrokeys might face?

also: ty for the good work!!

permalink
report
parent
reply
1 point

Cant wait for fingerprint keys to make it over to the nitro ecosystem!

permalink
report
parent
reply
15 points

I have a onlykey. Been using it for probably 5 years now. Not sure why they aren’t more common.

permalink
report
reply
4 points

I use Onlykey as well. Can do lots of things. Works fine.

permalink
report
parent
reply
12 points

For my own understanding, what potential dangers are there using a Yubikey as opposed to an open source key?

permalink
report
reply
7 points

I’m a novice myself, so don’t expect an accurate and technical answer. My understanding is that the argument basically boils down to “claim versus veracity” on any vulnerabilities or compromises in the key.

How do you know there aren’t significant security vulnerabilities in the key, or that there aren’t backdoors?

The open source community have some excellent security experts who can check and let us know if all is good, or if something is off.

permalink
report
parent
reply

Privacy

!privacy@lemmy.ml

Create post

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

Community stats

  • 7.8K

    Monthly active users

  • 2.5K

    Posts

  • 65K

    Comments