GET https://kbin.spritesserver.nl/index.php/u/@413j0@lemmy.world/commented

Security

Token

There is no security token.

Firewall

main Name
Security enabled
Stateless

Configuration

Key Value
provider security.user.provider.concrete.app_user_provider
context main
entry_point App\Security\KbinAuthenticator
user_checker App\Security\UserChecker
access_denied_handler (none)
access_denied_url (none)
authenticators
[
  "two_factor"
  "remember_me"
  "App\Security\KbinAuthenticator"
  "App\Security\FacebookAuthenticator"
  "App\Security\GoogleAuthenticator"
  "App\Security\GithubAuthenticator"
  "App\Security\KeycloakAuthenticator"
]

Listeners

Listener Duration Response
Symfony\Component\Security\Http\Firewall\ChannelListener {#723
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
  -logger: Monolog\Logger {#783 …}
  -httpPort: 80
  -httpsPort: 443
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\ContextListener {#706
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage {#1017 …}
  -sessionKey: "_security_main"
  -logger: Monolog\Logger {#783 …}
  -userProviders: Symfony\Component\DependencyInjection\Argument\RewindableGenerator {#705 …}
  -dispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
  -registered: false
  -trustResolver: Scheb\TwoFactorBundle\Security\Authentication\AuthenticationTrustResolver {#780 …}
  -sessionTrackerEnabler: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage::enableUsageTracking(): void {#703 …}
}
6.07 ms (none)
Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener {#584
  -authenticatorManager: Symfony\Component\Security\Http\Authentication\AuthenticatorManager {#595 …}
}
0.00 ms (none)
Scheb\TwoFactorBundle\Security\Http\Firewall\TwoFactorAccessListener {#582
  -twoFactorFirewallConfig: Scheb\TwoFactorBundle\Security\TwoFactor\TwoFactorFirewallConfig {#842 …}
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -twoFactorAccessDecider: Scheb\TwoFactorBundle\Security\Authorization\TwoFactorAccessDecider {#581 …}
}
0.06 ms (none)
Symfony\Component\Security\Http\Firewall\AccessListener {#579
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -accessDecisionManager: Symfony\Component\Security\Core\Authorization\TraceableAccessDecisionManager {#937 …}
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\LogoutListener {#786
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -options: [
    "csrf_parameter" => "_csrf_token"
    "csrf_token_id" => "logout"
    "logout_path" => "app_logout"
  ]
  -httpUtils: Symfony\Component\Security\Http\HttpUtils {#841 …}
  -csrfTokenManager: Symfony\Component\Security\Csrf\CsrfTokenManager {#1015 …}
  -eventDispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
}
0.00 ms (none)

Authenticators

No authenticators have been recorded. Check previous profiles on your authentication endpoint.

Access Decision

affirmative Strategy
# Voter class
1
"Symfony\Component\Security\Core\Authorization\Voter\AuthenticatedVoter"
2
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
3
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
4
"Symfony\Component\Security\Core\Authorization\Voter\ExpressionVoter"
5
"App\Security\Voter\EntryCommentVoter"
6
"App\Security\Voter\EntryVoter"
7
"App\Security\Voter\MagazineVoter"
8
"App\Security\Voter\MessageThreadVoter"
9
"App\Security\Voter\MessageVoter"
10
"App\Security\Voter\NotificationVoter"
11
"App\Security\Voter\OAuth2UserConsentVoter"
12
"App\Security\Voter\PostCommentVoter"
13
"App\Security\Voter\PostVoter"
14
"App\Security\Voter\UserVoter"

Access decision log

# Result Attributes Object
1 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
2 DENIED moderate
Proxies\__CG__\App\Entity\Post {#1549
  +user: Proxies\__CG__\App\Entity\User {#2888 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1562 …}
  +image: null
  +slug: "Hardware-security-key-options-I-ve-been-thinking-about-getting-a"
  +body: """
    Hardware security key options?\n
    \n
    I've been thinking about getting a hardware security key and have heard of yubikey before; but I want to see what my options are and if they are worth it in your opinion.  \n
    My current setup is a local KeePassXC database (that I sync between my PC and phone and also acts as TOTP authenticator app), I know that KeePass supports hardware keys for unlocking the database.\n
    \n
    I am personally still of the belief that passwords are the safest when done right; but 2FA/MFA can greatly increase security on top of that (again, if done right).  \n
    The key work work together with already existing passwords, not replace them.\n
    \n
    As I use linux as my primary OS I do expect it to support it and anything that doesn't I will have to pass on.\n
    \n
    PS: what are the things I need to know about these hardware keys that's not being talked about too much, I am very much delving into new territory and want to make sure I'm properly educated before I delve in.\n
    \n
    @linux@lemmy.ml @technology@lemmy.ml @technology@lemmy.world @privacy@lemmy.ml #2FA #MFA #yubikey #InfoSec #CyberSecurity
    """
  +lang: "en"
  +commentCount: 26
  +favouriteCount: 72
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1712213847 {#2809
    date: 2024-04-04 08:57:27.0 +02:00
  }
  +ip: null
  +tags: [
    "2fa"
    "mfa"
    "yubikey"
    "infosec"
    "cybersecurity"
  ]
  +mentions: [
    "@linux@lemmy.ml"
    "@technology@lemmy.ml"
    "@technology@lemmy.world"
    "@privacy@lemmy.ml"
  ]
  +comments: Doctrine\ORM\PersistentCollection {#2887 …}
  +votes: Doctrine\ORM\PersistentCollection {#2885 …}
  +reports: Doctrine\ORM\PersistentCollection {#2883 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2851 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2855 …}
  +children: [
    App\Entity\PostComment {#1670
      +user: App\Entity\User {#264 …}
      +post: Proxies\__CG__\App\Entity\Post {#1549 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1562 …}
      +parent: null
      +root: null
      +image: null
      +body: """
        I personally just have 3 u2f keys from different brands, one of them is a yubikey, but I only use the u2f functionality. I have read enough about the u2f standard to trust it, but the other fluff on some keys I don’t trust enoug in to use on my accounts, and the basic u2f functionality works perfectly on Linux (I even use it for my Linux login) and basically everywhere\n
        \n
        I keep one on my keychain(it has an USBA port, but I keep a female a to male c converter on it as cap so I can use it on my phone), another that has password protection instead of a single button lives on a port on my desktop and the third I keep stored, it is more annoying to set up all of them on a new account, but I know I won’t loose access or have to recover my accounts if I loose my keychain.\n
        \n
        And for sites that don’t support u2f I use Aegis for TOTP which would also be my recommendation, that way if your KeePassXC database is compromised your second factor is safe, and you can also have automatic encrypted backups of your Aegis dB synchronised across devices so you don’t loose them\n
        \n
        And if you are going to be setting up keys on multiple sites don’t forget to update or generate your single use recovery codes and store the safely, preferably on paper not digitally.\n
        \n
        I personally print mine on regular printer paper on sections about the size of a library card and then I spread some UV curing resin until it soaks through, then I clean the excess and leave them on the sun for about 2 hours (most printer paper has optical brightener that makes the resin much slower to cure). I then cut the individual segments and store them on my safe\n
        \n
        It may be paranoid, but it’s extra work just when creating an account, and I started doing it after I permanently lost access to a trading account because of a lost key and a faded recovery code, thankfully it had no balance stored there at the time
        """
      +lang: "en"
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1704373070 {#1672
        date: 2024-01-04 13:57:50.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@linux@lemmy.ml"
        "@technology@lemmy.ml"
        "@technology@lemmy.world"
        "@privacy@lemmy.ml"
        "@Scraft161@tsukihi.me"
        "@linux@lemmy.ml"
        "@technology@lemmy.ml"
        "@technology@lemmy.world"
        "@privacy@lemmy.ml"
        "@Scraft161@tsukihi.me"
        "@linux@lemmy.ml"
        "@technology@lemmy.ml"
        "@technology@lemmy.world"
        "@privacy@lemmy.ml"
        "@Scraft161@tsukihi.me"
      ]
      +isAdult: false
      +updateMark: false
      +children: Doctrine\ORM\PersistentCollection {#1563 …}
      +nested: Doctrine\ORM\PersistentCollection {#1564 …}
      +votes: Doctrine\ORM\PersistentCollection {#1559 …}
      +reports: Doctrine\ORM\PersistentCollection {#1567 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1556 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1571 …}
      -id: 1026
      -bodyTs: "'2':291 '3':5 'access':150,342 'account':52,142,156,332,346 'across':207 'aegi':172,204 'also':177,197 'annoy':132 'anoth':106 'automat':199 'backup':201 'balanc':361 'basic':55,71 'brand':10 'brighten':298 'button':115 'c':92 'cap':97 'card':265 'clean':280 'code':239,356 'compromis':188 'convert':93 'creat':330 'cure':272,306 'cut':309 'databas':186 'db':205 'desktop':122 'devic':208 'differ':9 'digit':248 'encrypt':200 'enoug':46 'enough':27 'even':63 'everywher':72 'excess':282 'extra':326 'factor':191 'fade':354 'femal':88 'fluff':38 'forget':230 'function':23,57 'generat':234 'go':219 'hour':292 'individu':311 'instead':111 'keep':74,86,127 'keepassxc':185 'key':7,41,224,351 'keychain':78,161 'know':145 'leav':284 'librari':264 'linux':61,68 'live':116 'login':69 'loos':149,159,213 'lost':341,350 'make':300 'male':91 'may':320 'mine':252 'much':303 'multipl':226 'new':141 'one':11,75 'optic':297 'paper':246,256,295 'paranoid':322 'password':109 'perfect':59 'perman':340 'person':2,250 'phone':105 'port':83,119 'prefer':244 'print':251 'printer':255,294 'protect':110 'read':26 'recommend':180 'recov':154 'recoveri':238,355 'regular':254 'resin':273,302 'safe':193,243,318 'second':190 'section':258 'segment':312 'set':134,222 'singl':114,236 'site':164,227 'size':261 'slower':304 'soak':276 'spread':269 'standard':31 'start':335 'store':128,241,314,362 'sun':288 'support':168 'synchronis':206 'thank':357 'third':125 'time':366 'totp':174 'trade':345 'trust':33,45 'u2f':6,22,30,56,169 'updat':232 'usba':82 'use':20,49,64,101,171,237 'uv':271 'way':182 'won':147 'work':58,327 'would':176 'yubikey':16"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.world/comment/6399687"
      +editedAt: DateTimeImmutable @1711561401 {#1665
        date: 2024-03-27 18:43:21.0 +01:00
      }
      +createdAt: DateTimeImmutable @1704373070 {#1674
        date: 2024-01-04 13:57:50.0 +01:00
      }
      +"title": 1026
    }
  ]
  -id: 343
  -bodyTs: "'2fa':186 '2fa/mfa':89 'act':57 'alreadi':108 'also':56 'anyth':130 'app':61 'authent':60 'belief':79 'current':40 'cybersecur':190 'databas':46,72 'delv':165,180 'doesn':132 'done':86,100 'educ':177 'exist':109 'expect':124 'get':10 'great':91 'hardwar':1,12,67,151 'heard':17 'increas':92 'infosec':189 'keepass':65 'keepassxc':45 'key':3,14,68,103,152 'know':63,148 'linux':117 'linux@lemmy.ml':182 'local':44 'm':175 'make':172 'mfa':187 'much':160,164 'need':146 'new':167 'opinion':38 'option':4,28 'os':121 'pass':138 'password':81,110 'pc':52 'person':75 'phone':54 'primari':120 'privacy@lemmy.ml':185 'proper':176 'ps':140 'replac':112 'right':87,101 'safest':84 'secur':2,13,93 'see':25 'setup':41 'still':76 'support':66,127 'sure':173 'sync':49 'talk':157 'technology@lemmy.ml':183 'technology@lemmy.world':184 'territori':168 'thing':144 'think':8 'togeth':106 'top':95 'totp':59 'unlock':70 'use':116 've':6 'want':23,170 'work':104,105 'worth':34 'yubikey':19,188"
  +upVotes: 0
  +downVotes: 0
  +ranking: 1704402491
  +visibility: "visible             "
  +apId: "https://tsukihi.me/users/Scraft161/statuses/111694059376735181"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704316091 {#2808
    date: 2024-01-03 22:08:11.0 +01:00
  }
  +__isInitialized__: true
  +"title": 343
   …2
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS DENIED
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
3 DENIED edit
Proxies\__CG__\App\Entity\Post {#1549
  +user: Proxies\__CG__\App\Entity\User {#2888 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1562 …}
  +image: null
  +slug: "Hardware-security-key-options-I-ve-been-thinking-about-getting-a"
  +body: """
    Hardware security key options?\n
    \n
    I've been thinking about getting a hardware security key and have heard of yubikey before; but I want to see what my options are and if they are worth it in your opinion.  \n
    My current setup is a local KeePassXC database (that I sync between my PC and phone and also acts as TOTP authenticator app), I know that KeePass supports hardware keys for unlocking the database.\n
    \n
    I am personally still of the belief that passwords are the safest when done right; but 2FA/MFA can greatly increase security on top of that (again, if done right).  \n
    The key work work together with already existing passwords, not replace them.\n
    \n
    As I use linux as my primary OS I do expect it to support it and anything that doesn't I will have to pass on.\n
    \n
    PS: what are the things I need to know about these hardware keys that's not being talked about too much, I am very much delving into new territory and want to make sure I'm properly educated before I delve in.\n
    \n
    @linux@lemmy.ml @technology@lemmy.ml @technology@lemmy.world @privacy@lemmy.ml #2FA #MFA #yubikey #InfoSec #CyberSecurity
    """
  +lang: "en"
  +commentCount: 26
  +favouriteCount: 72
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1712213847 {#2809
    date: 2024-04-04 08:57:27.0 +02:00
  }
  +ip: null
  +tags: [
    "2fa"
    "mfa"
    "yubikey"
    "infosec"
    "cybersecurity"
  ]
  +mentions: [
    "@linux@lemmy.ml"
    "@technology@lemmy.ml"
    "@technology@lemmy.world"
    "@privacy@lemmy.ml"
  ]
  +comments: Doctrine\ORM\PersistentCollection {#2887 …}
  +votes: Doctrine\ORM\PersistentCollection {#2885 …}
  +reports: Doctrine\ORM\PersistentCollection {#2883 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2851 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2855 …}
  +children: [
    App\Entity\PostComment {#1670
      +user: App\Entity\User {#264 …}
      +post: Proxies\__CG__\App\Entity\Post {#1549 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1562 …}
      +parent: null
      +root: null
      +image: null
      +body: """
        I personally just have 3 u2f keys from different brands, one of them is a yubikey, but I only use the u2f functionality. I have read enough about the u2f standard to trust it, but the other fluff on some keys I don’t trust enoug in to use on my accounts, and the basic u2f functionality works perfectly on Linux (I even use it for my Linux login) and basically everywhere\n
        \n
        I keep one on my keychain(it has an USBA port, but I keep a female a to male c converter on it as cap so I can use it on my phone), another that has password protection instead of a single button lives on a port on my desktop and the third I keep stored, it is more annoying to set up all of them on a new account, but I know I won’t loose access or have to recover my accounts if I loose my keychain.\n
        \n
        And for sites that don’t support u2f I use Aegis for TOTP which would also be my recommendation, that way if your KeePassXC database is compromised your second factor is safe, and you can also have automatic encrypted backups of your Aegis dB synchronised across devices so you don’t loose them\n
        \n
        And if you are going to be setting up keys on multiple sites don’t forget to update or generate your single use recovery codes and store the safely, preferably on paper not digitally.\n
        \n
        I personally print mine on regular printer paper on sections about the size of a library card and then I spread some UV curing resin until it soaks through, then I clean the excess and leave them on the sun for about 2 hours (most printer paper has optical brightener that makes the resin much slower to cure). I then cut the individual segments and store them on my safe\n
        \n
        It may be paranoid, but it’s extra work just when creating an account, and I started doing it after I permanently lost access to a trading account because of a lost key and a faded recovery code, thankfully it had no balance stored there at the time
        """
      +lang: "en"
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1704373070 {#1672
        date: 2024-01-04 13:57:50.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@linux@lemmy.ml"
        "@technology@lemmy.ml"
        "@technology@lemmy.world"
        "@privacy@lemmy.ml"
        "@Scraft161@tsukihi.me"
        "@linux@lemmy.ml"
        "@technology@lemmy.ml"
        "@technology@lemmy.world"
        "@privacy@lemmy.ml"
        "@Scraft161@tsukihi.me"
        "@linux@lemmy.ml"
        "@technology@lemmy.ml"
        "@technology@lemmy.world"
        "@privacy@lemmy.ml"
        "@Scraft161@tsukihi.me"
      ]
      +isAdult: false
      +updateMark: false
      +children: Doctrine\ORM\PersistentCollection {#1563 …}
      +nested: Doctrine\ORM\PersistentCollection {#1564 …}
      +votes: Doctrine\ORM\PersistentCollection {#1559 …}
      +reports: Doctrine\ORM\PersistentCollection {#1567 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1556 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1571 …}
      -id: 1026
      -bodyTs: "'2':291 '3':5 'access':150,342 'account':52,142,156,332,346 'across':207 'aegi':172,204 'also':177,197 'annoy':132 'anoth':106 'automat':199 'backup':201 'balanc':361 'basic':55,71 'brand':10 'brighten':298 'button':115 'c':92 'cap':97 'card':265 'clean':280 'code':239,356 'compromis':188 'convert':93 'creat':330 'cure':272,306 'cut':309 'databas':186 'db':205 'desktop':122 'devic':208 'differ':9 'digit':248 'encrypt':200 'enoug':46 'enough':27 'even':63 'everywher':72 'excess':282 'extra':326 'factor':191 'fade':354 'femal':88 'fluff':38 'forget':230 'function':23,57 'generat':234 'go':219 'hour':292 'individu':311 'instead':111 'keep':74,86,127 'keepassxc':185 'key':7,41,224,351 'keychain':78,161 'know':145 'leav':284 'librari':264 'linux':61,68 'live':116 'login':69 'loos':149,159,213 'lost':341,350 'make':300 'male':91 'may':320 'mine':252 'much':303 'multipl':226 'new':141 'one':11,75 'optic':297 'paper':246,256,295 'paranoid':322 'password':109 'perfect':59 'perman':340 'person':2,250 'phone':105 'port':83,119 'prefer':244 'print':251 'printer':255,294 'protect':110 'read':26 'recommend':180 'recov':154 'recoveri':238,355 'regular':254 'resin':273,302 'safe':193,243,318 'second':190 'section':258 'segment':312 'set':134,222 'singl':114,236 'site':164,227 'size':261 'slower':304 'soak':276 'spread':269 'standard':31 'start':335 'store':128,241,314,362 'sun':288 'support':168 'synchronis':206 'thank':357 'third':125 'time':366 'totp':174 'trade':345 'trust':33,45 'u2f':6,22,30,56,169 'updat':232 'usba':82 'use':20,49,64,101,171,237 'uv':271 'way':182 'won':147 'work':58,327 'would':176 'yubikey':16"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.world/comment/6399687"
      +editedAt: DateTimeImmutable @1711561401 {#1665
        date: 2024-03-27 18:43:21.0 +01:00
      }
      +createdAt: DateTimeImmutable @1704373070 {#1674
        date: 2024-01-04 13:57:50.0 +01:00
      }
      +"title": 1026
    }
  ]
  -id: 343
  -bodyTs: "'2fa':186 '2fa/mfa':89 'act':57 'alreadi':108 'also':56 'anyth':130 'app':61 'authent':60 'belief':79 'current':40 'cybersecur':190 'databas':46,72 'delv':165,180 'doesn':132 'done':86,100 'educ':177 'exist':109 'expect':124 'get':10 'great':91 'hardwar':1,12,67,151 'heard':17 'increas':92 'infosec':189 'keepass':65 'keepassxc':45 'key':3,14,68,103,152 'know':63,148 'linux':117 'linux@lemmy.ml':182 'local':44 'm':175 'make':172 'mfa':187 'much':160,164 'need':146 'new':167 'opinion':38 'option':4,28 'os':121 'pass':138 'password':81,110 'pc':52 'person':75 'phone':54 'primari':120 'privacy@lemmy.ml':185 'proper':176 'ps':140 'replac':112 'right':87,101 'safest':84 'secur':2,13,93 'see':25 'setup':41 'still':76 'support':66,127 'sure':173 'sync':49 'talk':157 'technology@lemmy.ml':183 'technology@lemmy.world':184 'territori':168 'thing':144 'think':8 'togeth':106 'top':95 'totp':59 'unlock':70 'use':116 've':6 'want':23,170 'work':104,105 'worth':34 'yubikey':19,188"
  +upVotes: 0
  +downVotes: 0
  +ranking: 1704402491
  +visibility: "visible             "
  +apId: "https://tsukihi.me/users/Scraft161/statuses/111694059376735181"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704316091 {#2808
    date: 2024-01-03 22:08:11.0 +01:00
  }
  +__isInitialized__: true
  +"title": 343
   …2
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS DENIED
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
4 DENIED moderate
Proxies\__CG__\App\Entity\Post {#1549
  +user: Proxies\__CG__\App\Entity\User {#2888 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1562 …}
  +image: null
  +slug: "Hardware-security-key-options-I-ve-been-thinking-about-getting-a"
  +body: """
    Hardware security key options?\n
    \n
    I've been thinking about getting a hardware security key and have heard of yubikey before; but I want to see what my options are and if they are worth it in your opinion.  \n
    My current setup is a local KeePassXC database (that I sync between my PC and phone and also acts as TOTP authenticator app), I know that KeePass supports hardware keys for unlocking the database.\n
    \n
    I am personally still of the belief that passwords are the safest when done right; but 2FA/MFA can greatly increase security on top of that (again, if done right).  \n
    The key work work together with already existing passwords, not replace them.\n
    \n
    As I use linux as my primary OS I do expect it to support it and anything that doesn't I will have to pass on.\n
    \n
    PS: what are the things I need to know about these hardware keys that's not being talked about too much, I am very much delving into new territory and want to make sure I'm properly educated before I delve in.\n
    \n
    @linux@lemmy.ml @technology@lemmy.ml @technology@lemmy.world @privacy@lemmy.ml #2FA #MFA #yubikey #InfoSec #CyberSecurity
    """
  +lang: "en"
  +commentCount: 26
  +favouriteCount: 72
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1712213847 {#2809
    date: 2024-04-04 08:57:27.0 +02:00
  }
  +ip: null
  +tags: [
    "2fa"
    "mfa"
    "yubikey"
    "infosec"
    "cybersecurity"
  ]
  +mentions: [
    "@linux@lemmy.ml"
    "@technology@lemmy.ml"
    "@technology@lemmy.world"
    "@privacy@lemmy.ml"
  ]
  +comments: Doctrine\ORM\PersistentCollection {#2887 …}
  +votes: Doctrine\ORM\PersistentCollection {#2885 …}
  +reports: Doctrine\ORM\PersistentCollection {#2883 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2851 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2855 …}
  +children: [
    App\Entity\PostComment {#1670
      +user: App\Entity\User {#264 …}
      +post: Proxies\__CG__\App\Entity\Post {#1549 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1562 …}
      +parent: null
      +root: null
      +image: null
      +body: """
        I personally just have 3 u2f keys from different brands, one of them is a yubikey, but I only use the u2f functionality. I have read enough about the u2f standard to trust it, but the other fluff on some keys I don’t trust enoug in to use on my accounts, and the basic u2f functionality works perfectly on Linux (I even use it for my Linux login) and basically everywhere\n
        \n
        I keep one on my keychain(it has an USBA port, but I keep a female a to male c converter on it as cap so I can use it on my phone), another that has password protection instead of a single button lives on a port on my desktop and the third I keep stored, it is more annoying to set up all of them on a new account, but I know I won’t loose access or have to recover my accounts if I loose my keychain.\n
        \n
        And for sites that don’t support u2f I use Aegis for TOTP which would also be my recommendation, that way if your KeePassXC database is compromised your second factor is safe, and you can also have automatic encrypted backups of your Aegis dB synchronised across devices so you don’t loose them\n
        \n
        And if you are going to be setting up keys on multiple sites don’t forget to update or generate your single use recovery codes and store the safely, preferably on paper not digitally.\n
        \n
        I personally print mine on regular printer paper on sections about the size of a library card and then I spread some UV curing resin until it soaks through, then I clean the excess and leave them on the sun for about 2 hours (most printer paper has optical brightener that makes the resin much slower to cure). I then cut the individual segments and store them on my safe\n
        \n
        It may be paranoid, but it’s extra work just when creating an account, and I started doing it after I permanently lost access to a trading account because of a lost key and a faded recovery code, thankfully it had no balance stored there at the time
        """
      +lang: "en"
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1704373070 {#1672
        date: 2024-01-04 13:57:50.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@linux@lemmy.ml"
        "@technology@lemmy.ml"
        "@technology@lemmy.world"
        "@privacy@lemmy.ml"
        "@Scraft161@tsukihi.me"
        "@linux@lemmy.ml"
        "@technology@lemmy.ml"
        "@technology@lemmy.world"
        "@privacy@lemmy.ml"
        "@Scraft161@tsukihi.me"
        "@linux@lemmy.ml"
        "@technology@lemmy.ml"
        "@technology@lemmy.world"
        "@privacy@lemmy.ml"
        "@Scraft161@tsukihi.me"
      ]
      +isAdult: false
      +updateMark: false
      +children: Doctrine\ORM\PersistentCollection {#1563 …}
      +nested: Doctrine\ORM\PersistentCollection {#1564 …}
      +votes: Doctrine\ORM\PersistentCollection {#1559 …}
      +reports: Doctrine\ORM\PersistentCollection {#1567 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1556 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1571 …}
      -id: 1026
      -bodyTs: "'2':291 '3':5 'access':150,342 'account':52,142,156,332,346 'across':207 'aegi':172,204 'also':177,197 'annoy':132 'anoth':106 'automat':199 'backup':201 'balanc':361 'basic':55,71 'brand':10 'brighten':298 'button':115 'c':92 'cap':97 'card':265 'clean':280 'code':239,356 'compromis':188 'convert':93 'creat':330 'cure':272,306 'cut':309 'databas':186 'db':205 'desktop':122 'devic':208 'differ':9 'digit':248 'encrypt':200 'enoug':46 'enough':27 'even':63 'everywher':72 'excess':282 'extra':326 'factor':191 'fade':354 'femal':88 'fluff':38 'forget':230 'function':23,57 'generat':234 'go':219 'hour':292 'individu':311 'instead':111 'keep':74,86,127 'keepassxc':185 'key':7,41,224,351 'keychain':78,161 'know':145 'leav':284 'librari':264 'linux':61,68 'live':116 'login':69 'loos':149,159,213 'lost':341,350 'make':300 'male':91 'may':320 'mine':252 'much':303 'multipl':226 'new':141 'one':11,75 'optic':297 'paper':246,256,295 'paranoid':322 'password':109 'perfect':59 'perman':340 'person':2,250 'phone':105 'port':83,119 'prefer':244 'print':251 'printer':255,294 'protect':110 'read':26 'recommend':180 'recov':154 'recoveri':238,355 'regular':254 'resin':273,302 'safe':193,243,318 'second':190 'section':258 'segment':312 'set':134,222 'singl':114,236 'site':164,227 'size':261 'slower':304 'soak':276 'spread':269 'standard':31 'start':335 'store':128,241,314,362 'sun':288 'support':168 'synchronis':206 'thank':357 'third':125 'time':366 'totp':174 'trade':345 'trust':33,45 'u2f':6,22,30,56,169 'updat':232 'usba':82 'use':20,49,64,101,171,237 'uv':271 'way':182 'won':147 'work':58,327 'would':176 'yubikey':16"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.world/comment/6399687"
      +editedAt: DateTimeImmutable @1711561401 {#1665
        date: 2024-03-27 18:43:21.0 +01:00
      }
      +createdAt: DateTimeImmutable @1704373070 {#1674
        date: 2024-01-04 13:57:50.0 +01:00
      }
      +"title": 1026
    }
  ]
  -id: 343
  -bodyTs: "'2fa':186 '2fa/mfa':89 'act':57 'alreadi':108 'also':56 'anyth':130 'app':61 'authent':60 'belief':79 'current':40 'cybersecur':190 'databas':46,72 'delv':165,180 'doesn':132 'done':86,100 'educ':177 'exist':109 'expect':124 'get':10 'great':91 'hardwar':1,12,67,151 'heard':17 'increas':92 'infosec':189 'keepass':65 'keepassxc':45 'key':3,14,68,103,152 'know':63,148 'linux':117 'linux@lemmy.ml':182 'local':44 'm':175 'make':172 'mfa':187 'much':160,164 'need':146 'new':167 'opinion':38 'option':4,28 'os':121 'pass':138 'password':81,110 'pc':52 'person':75 'phone':54 'primari':120 'privacy@lemmy.ml':185 'proper':176 'ps':140 'replac':112 'right':87,101 'safest':84 'secur':2,13,93 'see':25 'setup':41 'still':76 'support':66,127 'sure':173 'sync':49 'talk':157 'technology@lemmy.ml':183 'technology@lemmy.world':184 'territori':168 'thing':144 'think':8 'togeth':106 'top':95 'totp':59 'unlock':70 'use':116 've':6 'want':23,170 'work':104,105 'worth':34 'yubikey':19,188"
  +upVotes: 0
  +downVotes: 0
  +ranking: 1704402491
  +visibility: "visible             "
  +apId: "https://tsukihi.me/users/Scraft161/statuses/111694059376735181"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704316091 {#2808
    date: 2024-01-03 22:08:11.0 +01:00
  }
  +__isInitialized__: true
  +"title": 343
   …2
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS DENIED
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
5 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
6 DENIED moderate
App\Entity\PostComment {#1670
  +user: App\Entity\User {#264 …}
  +post: Proxies\__CG__\App\Entity\Post {#1549
    +user: Proxies\__CG__\App\Entity\User {#2888 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1562 …}
    +image: null
    +slug: "Hardware-security-key-options-I-ve-been-thinking-about-getting-a"
    +body: """
      Hardware security key options?\n
      \n
      I've been thinking about getting a hardware security key and have heard of yubikey before; but I want to see what my options are and if they are worth it in your opinion.  \n
      My current setup is a local KeePassXC database (that I sync between my PC and phone and also acts as TOTP authenticator app), I know that KeePass supports hardware keys for unlocking the database.\n
      \n
      I am personally still of the belief that passwords are the safest when done right; but 2FA/MFA can greatly increase security on top of that (again, if done right).  \n
      The key work work together with already existing passwords, not replace them.\n
      \n
      As I use linux as my primary OS I do expect it to support it and anything that doesn't I will have to pass on.\n
      \n
      PS: what are the things I need to know about these hardware keys that's not being talked about too much, I am very much delving into new territory and want to make sure I'm properly educated before I delve in.\n
      \n
      @linux@lemmy.ml @technology@lemmy.ml @technology@lemmy.world @privacy@lemmy.ml #2FA #MFA #yubikey #InfoSec #CyberSecurity
      """
    +lang: "en"
    +commentCount: 26
    +favouriteCount: 72
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1712213847 {#2809
      date: 2024-04-04 08:57:27.0 +02:00
    }
    +ip: null
    +tags: [
      "2fa"
      "mfa"
      "yubikey"
      "infosec"
      "cybersecurity"
    ]
    +mentions: [
      "@linux@lemmy.ml"
      "@technology@lemmy.ml"
      "@technology@lemmy.world"
      "@privacy@lemmy.ml"
    ]
    +comments: Doctrine\ORM\PersistentCollection {#2887 …}
    +votes: Doctrine\ORM\PersistentCollection {#2885 …}
    +reports: Doctrine\ORM\PersistentCollection {#2883 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2851 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2855 …}
    +children: [
      App\Entity\PostComment {#1670}
    ]
    -id: 343
    -bodyTs: "'2fa':186 '2fa/mfa':89 'act':57 'alreadi':108 'also':56 'anyth':130 'app':61 'authent':60 'belief':79 'current':40 'cybersecur':190 'databas':46,72 'delv':165,180 'doesn':132 'done':86,100 'educ':177 'exist':109 'expect':124 'get':10 'great':91 'hardwar':1,12,67,151 'heard':17 'increas':92 'infosec':189 'keepass':65 'keepassxc':45 'key':3,14,68,103,152 'know':63,148 'linux':117 'linux@lemmy.ml':182 'local':44 'm':175 'make':172 'mfa':187 'much':160,164 'need':146 'new':167 'opinion':38 'option':4,28 'os':121 'pass':138 'password':81,110 'pc':52 'person':75 'phone':54 'primari':120 'privacy@lemmy.ml':185 'proper':176 'ps':140 'replac':112 'right':87,101 'safest':84 'secur':2,13,93 'see':25 'setup':41 'still':76 'support':66,127 'sure':173 'sync':49 'talk':157 'technology@lemmy.ml':183 'technology@lemmy.world':184 'territori':168 'thing':144 'think':8 'togeth':106 'top':95 'totp':59 'unlock':70 'use':116 've':6 'want':23,170 'work':104,105 'worth':34 'yubikey':19,188"
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704402491
    +visibility: "visible             "
    +apId: "https://tsukihi.me/users/Scraft161/statuses/111694059376735181"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704316091 {#2808
      date: 2024-01-03 22:08:11.0 +01:00
    }
    +__isInitialized__: true
    +"title": 343
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1562 …}
  +parent: null
  +root: null
  +image: null
  +body: """
    I personally just have 3 u2f keys from different brands, one of them is a yubikey, but I only use the u2f functionality. I have read enough about the u2f standard to trust it, but the other fluff on some keys I don’t trust enoug in to use on my accounts, and the basic u2f functionality works perfectly on Linux (I even use it for my Linux login) and basically everywhere\n
    \n
    I keep one on my keychain(it has an USBA port, but I keep a female a to male c converter on it as cap so I can use it on my phone), another that has password protection instead of a single button lives on a port on my desktop and the third I keep stored, it is more annoying to set up all of them on a new account, but I know I won’t loose access or have to recover my accounts if I loose my keychain.\n
    \n
    And for sites that don’t support u2f I use Aegis for TOTP which would also be my recommendation, that way if your KeePassXC database is compromised your second factor is safe, and you can also have automatic encrypted backups of your Aegis dB synchronised across devices so you don’t loose them\n
    \n
    And if you are going to be setting up keys on multiple sites don’t forget to update or generate your single use recovery codes and store the safely, preferably on paper not digitally.\n
    \n
    I personally print mine on regular printer paper on sections about the size of a library card and then I spread some UV curing resin until it soaks through, then I clean the excess and leave them on the sun for about 2 hours (most printer paper has optical brightener that makes the resin much slower to cure). I then cut the individual segments and store them on my safe\n
    \n
    It may be paranoid, but it’s extra work just when creating an account, and I started doing it after I permanently lost access to a trading account because of a lost key and a faded recovery code, thankfully it had no balance stored there at the time
    """
  +lang: "en"
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1704373070 {#1672
    date: 2024-01-04 13:57:50.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@linux@lemmy.ml"
    "@technology@lemmy.ml"
    "@technology@lemmy.world"
    "@privacy@lemmy.ml"
    "@Scraft161@tsukihi.me"
    "@linux@lemmy.ml"
    "@technology@lemmy.ml"
    "@technology@lemmy.world"
    "@privacy@lemmy.ml"
    "@Scraft161@tsukihi.me"
    "@linux@lemmy.ml"
    "@technology@lemmy.ml"
    "@technology@lemmy.world"
    "@privacy@lemmy.ml"
    "@Scraft161@tsukihi.me"
  ]
  +isAdult: false
  +updateMark: false
  +children: Doctrine\ORM\PersistentCollection {#1563 …}
  +nested: Doctrine\ORM\PersistentCollection {#1564 …}
  +votes: Doctrine\ORM\PersistentCollection {#1559 …}
  +reports: Doctrine\ORM\PersistentCollection {#1567 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1556 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1571 …}
  -id: 1026
  -bodyTs: "'2':291 '3':5 'access':150,342 'account':52,142,156,332,346 'across':207 'aegi':172,204 'also':177,197 'annoy':132 'anoth':106 'automat':199 'backup':201 'balanc':361 'basic':55,71 'brand':10 'brighten':298 'button':115 'c':92 'cap':97 'card':265 'clean':280 'code':239,356 'compromis':188 'convert':93 'creat':330 'cure':272,306 'cut':309 'databas':186 'db':205 'desktop':122 'devic':208 'differ':9 'digit':248 'encrypt':200 'enoug':46 'enough':27 'even':63 'everywher':72 'excess':282 'extra':326 'factor':191 'fade':354 'femal':88 'fluff':38 'forget':230 'function':23,57 'generat':234 'go':219 'hour':292 'individu':311 'instead':111 'keep':74,86,127 'keepassxc':185 'key':7,41,224,351 'keychain':78,161 'know':145 'leav':284 'librari':264 'linux':61,68 'live':116 'login':69 'loos':149,159,213 'lost':341,350 'make':300 'male':91 'may':320 'mine':252 'much':303 'multipl':226 'new':141 'one':11,75 'optic':297 'paper':246,256,295 'paranoid':322 'password':109 'perfect':59 'perman':340 'person':2,250 'phone':105 'port':83,119 'prefer':244 'print':251 'printer':255,294 'protect':110 'read':26 'recommend':180 'recov':154 'recoveri':238,355 'regular':254 'resin':273,302 'safe':193,243,318 'second':190 'section':258 'segment':312 'set':134,222 'singl':114,236 'site':164,227 'size':261 'slower':304 'soak':276 'spread':269 'standard':31 'start':335 'store':128,241,314,362 'sun':288 'support':168 'synchronis':206 'thank':357 'third':125 'time':366 'totp':174 'trade':345 'trust':33,45 'u2f':6,22,30,56,169 'updat':232 'usba':82 'use':20,49,64,101,171,237 'uv':271 'way':182 'won':147 'work':58,327 'would':176 'yubikey':16"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/6399687"
  +editedAt: DateTimeImmutable @1711561401 {#1665
    date: 2024-03-27 18:43:21.0 +01:00
  }
  +createdAt: DateTimeImmutable @1704373070 {#1674
    date: 2024-01-04 13:57:50.0 +01:00
  }
  +"title": 1026
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS DENIED
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
7 DENIED edit
App\Entity\PostComment {#1670
  +user: App\Entity\User {#264 …}
  +post: Proxies\__CG__\App\Entity\Post {#1549
    +user: Proxies\__CG__\App\Entity\User {#2888 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1562 …}
    +image: null
    +slug: "Hardware-security-key-options-I-ve-been-thinking-about-getting-a"
    +body: """
      Hardware security key options?\n
      \n
      I've been thinking about getting a hardware security key and have heard of yubikey before; but I want to see what my options are and if they are worth it in your opinion.  \n
      My current setup is a local KeePassXC database (that I sync between my PC and phone and also acts as TOTP authenticator app), I know that KeePass supports hardware keys for unlocking the database.\n
      \n
      I am personally still of the belief that passwords are the safest when done right; but 2FA/MFA can greatly increase security on top of that (again, if done right).  \n
      The key work work together with already existing passwords, not replace them.\n
      \n
      As I use linux as my primary OS I do expect it to support it and anything that doesn't I will have to pass on.\n
      \n
      PS: what are the things I need to know about these hardware keys that's not being talked about too much, I am very much delving into new territory and want to make sure I'm properly educated before I delve in.\n
      \n
      @linux@lemmy.ml @technology@lemmy.ml @technology@lemmy.world @privacy@lemmy.ml #2FA #MFA #yubikey #InfoSec #CyberSecurity
      """
    +lang: "en"
    +commentCount: 26
    +favouriteCount: 72
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1712213847 {#2809
      date: 2024-04-04 08:57:27.0 +02:00
    }
    +ip: null
    +tags: [
      "2fa"
      "mfa"
      "yubikey"
      "infosec"
      "cybersecurity"
    ]
    +mentions: [
      "@linux@lemmy.ml"
      "@technology@lemmy.ml"
      "@technology@lemmy.world"
      "@privacy@lemmy.ml"
    ]
    +comments: Doctrine\ORM\PersistentCollection {#2887 …}
    +votes: Doctrine\ORM\PersistentCollection {#2885 …}
    +reports: Doctrine\ORM\PersistentCollection {#2883 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2851 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2855 …}
    +children: [
      App\Entity\PostComment {#1670}
    ]
    -id: 343
    -bodyTs: "'2fa':186 '2fa/mfa':89 'act':57 'alreadi':108 'also':56 'anyth':130 'app':61 'authent':60 'belief':79 'current':40 'cybersecur':190 'databas':46,72 'delv':165,180 'doesn':132 'done':86,100 'educ':177 'exist':109 'expect':124 'get':10 'great':91 'hardwar':1,12,67,151 'heard':17 'increas':92 'infosec':189 'keepass':65 'keepassxc':45 'key':3,14,68,103,152 'know':63,148 'linux':117 'linux@lemmy.ml':182 'local':44 'm':175 'make':172 'mfa':187 'much':160,164 'need':146 'new':167 'opinion':38 'option':4,28 'os':121 'pass':138 'password':81,110 'pc':52 'person':75 'phone':54 'primari':120 'privacy@lemmy.ml':185 'proper':176 'ps':140 'replac':112 'right':87,101 'safest':84 'secur':2,13,93 'see':25 'setup':41 'still':76 'support':66,127 'sure':173 'sync':49 'talk':157 'technology@lemmy.ml':183 'technology@lemmy.world':184 'territori':168 'thing':144 'think':8 'togeth':106 'top':95 'totp':59 'unlock':70 'use':116 've':6 'want':23,170 'work':104,105 'worth':34 'yubikey':19,188"
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704402491
    +visibility: "visible             "
    +apId: "https://tsukihi.me/users/Scraft161/statuses/111694059376735181"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704316091 {#2808
      date: 2024-01-03 22:08:11.0 +01:00
    }
    +__isInitialized__: true
    +"title": 343
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1562 …}
  +parent: null
  +root: null
  +image: null
  +body: """
    I personally just have 3 u2f keys from different brands, one of them is a yubikey, but I only use the u2f functionality. I have read enough about the u2f standard to trust it, but the other fluff on some keys I don’t trust enoug in to use on my accounts, and the basic u2f functionality works perfectly on Linux (I even use it for my Linux login) and basically everywhere\n
    \n
    I keep one on my keychain(it has an USBA port, but I keep a female a to male c converter on it as cap so I can use it on my phone), another that has password protection instead of a single button lives on a port on my desktop and the third I keep stored, it is more annoying to set up all of them on a new account, but I know I won’t loose access or have to recover my accounts if I loose my keychain.\n
    \n
    And for sites that don’t support u2f I use Aegis for TOTP which would also be my recommendation, that way if your KeePassXC database is compromised your second factor is safe, and you can also have automatic encrypted backups of your Aegis dB synchronised across devices so you don’t loose them\n
    \n
    And if you are going to be setting up keys on multiple sites don’t forget to update or generate your single use recovery codes and store the safely, preferably on paper not digitally.\n
    \n
    I personally print mine on regular printer paper on sections about the size of a library card and then I spread some UV curing resin until it soaks through, then I clean the excess and leave them on the sun for about 2 hours (most printer paper has optical brightener that makes the resin much slower to cure). I then cut the individual segments and store them on my safe\n
    \n
    It may be paranoid, but it’s extra work just when creating an account, and I started doing it after I permanently lost access to a trading account because of a lost key and a faded recovery code, thankfully it had no balance stored there at the time
    """
  +lang: "en"
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1704373070 {#1672
    date: 2024-01-04 13:57:50.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@linux@lemmy.ml"
    "@technology@lemmy.ml"
    "@technology@lemmy.world"
    "@privacy@lemmy.ml"
    "@Scraft161@tsukihi.me"
    "@linux@lemmy.ml"
    "@technology@lemmy.ml"
    "@technology@lemmy.world"
    "@privacy@lemmy.ml"
    "@Scraft161@tsukihi.me"
    "@linux@lemmy.ml"
    "@technology@lemmy.ml"
    "@technology@lemmy.world"
    "@privacy@lemmy.ml"
    "@Scraft161@tsukihi.me"
  ]
  +isAdult: false
  +updateMark: false
  +children: Doctrine\ORM\PersistentCollection {#1563 …}
  +nested: Doctrine\ORM\PersistentCollection {#1564 …}
  +votes: Doctrine\ORM\PersistentCollection {#1559 …}
  +reports: Doctrine\ORM\PersistentCollection {#1567 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1556 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1571 …}
  -id: 1026
  -bodyTs: "'2':291 '3':5 'access':150,342 'account':52,142,156,332,346 'across':207 'aegi':172,204 'also':177,197 'annoy':132 'anoth':106 'automat':199 'backup':201 'balanc':361 'basic':55,71 'brand':10 'brighten':298 'button':115 'c':92 'cap':97 'card':265 'clean':280 'code':239,356 'compromis':188 'convert':93 'creat':330 'cure':272,306 'cut':309 'databas':186 'db':205 'desktop':122 'devic':208 'differ':9 'digit':248 'encrypt':200 'enoug':46 'enough':27 'even':63 'everywher':72 'excess':282 'extra':326 'factor':191 'fade':354 'femal':88 'fluff':38 'forget':230 'function':23,57 'generat':234 'go':219 'hour':292 'individu':311 'instead':111 'keep':74,86,127 'keepassxc':185 'key':7,41,224,351 'keychain':78,161 'know':145 'leav':284 'librari':264 'linux':61,68 'live':116 'login':69 'loos':149,159,213 'lost':341,350 'make':300 'male':91 'may':320 'mine':252 'much':303 'multipl':226 'new':141 'one':11,75 'optic':297 'paper':246,256,295 'paranoid':322 'password':109 'perfect':59 'perman':340 'person':2,250 'phone':105 'port':83,119 'prefer':244 'print':251 'printer':255,294 'protect':110 'read':26 'recommend':180 'recov':154 'recoveri':238,355 'regular':254 'resin':273,302 'safe':193,243,318 'second':190 'section':258 'segment':312 'set':134,222 'singl':114,236 'site':164,227 'size':261 'slower':304 'soak':276 'spread':269 'standard':31 'start':335 'store':128,241,314,362 'sun':288 'support':168 'synchronis':206 'thank':357 'third':125 'time':366 'totp':174 'trade':345 'trust':33,45 'u2f':6,22,30,56,169 'updat':232 'usba':82 'use':20,49,64,101,171,237 'uv':271 'way':182 'won':147 'work':58,327 'would':176 'yubikey':16"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/6399687"
  +editedAt: DateTimeImmutable @1711561401 {#1665
    date: 2024-03-27 18:43:21.0 +01:00
  }
  +createdAt: DateTimeImmutable @1704373070 {#1674
    date: 2024-01-04 13:57:50.0 +01:00
  }
  +"title": 1026
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS DENIED
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
8 DENIED moderate
App\Entity\PostComment {#1670
  +user: App\Entity\User {#264 …}
  +post: Proxies\__CG__\App\Entity\Post {#1549
    +user: Proxies\__CG__\App\Entity\User {#2888 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1562 …}
    +image: null
    +slug: "Hardware-security-key-options-I-ve-been-thinking-about-getting-a"
    +body: """
      Hardware security key options?\n
      \n
      I've been thinking about getting a hardware security key and have heard of yubikey before; but I want to see what my options are and if they are worth it in your opinion.  \n
      My current setup is a local KeePassXC database (that I sync between my PC and phone and also acts as TOTP authenticator app), I know that KeePass supports hardware keys for unlocking the database.\n
      \n
      I am personally still of the belief that passwords are the safest when done right; but 2FA/MFA can greatly increase security on top of that (again, if done right).  \n
      The key work work together with already existing passwords, not replace them.\n
      \n
      As I use linux as my primary OS I do expect it to support it and anything that doesn't I will have to pass on.\n
      \n
      PS: what are the things I need to know about these hardware keys that's not being talked about too much, I am very much delving into new territory and want to make sure I'm properly educated before I delve in.\n
      \n
      @linux@lemmy.ml @technology@lemmy.ml @technology@lemmy.world @privacy@lemmy.ml #2FA #MFA #yubikey #InfoSec #CyberSecurity
      """
    +lang: "en"
    +commentCount: 26
    +favouriteCount: 72
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1712213847 {#2809
      date: 2024-04-04 08:57:27.0 +02:00
    }
    +ip: null
    +tags: [
      "2fa"
      "mfa"
      "yubikey"
      "infosec"
      "cybersecurity"
    ]
    +mentions: [
      "@linux@lemmy.ml"
      "@technology@lemmy.ml"
      "@technology@lemmy.world"
      "@privacy@lemmy.ml"
    ]
    +comments: Doctrine\ORM\PersistentCollection {#2887 …}
    +votes: Doctrine\ORM\PersistentCollection {#2885 …}
    +reports: Doctrine\ORM\PersistentCollection {#2883 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2851 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2855 …}
    +children: [
      App\Entity\PostComment {#1670}
    ]
    -id: 343
    -bodyTs: "'2fa':186 '2fa/mfa':89 'act':57 'alreadi':108 'also':56 'anyth':130 'app':61 'authent':60 'belief':79 'current':40 'cybersecur':190 'databas':46,72 'delv':165,180 'doesn':132 'done':86,100 'educ':177 'exist':109 'expect':124 'get':10 'great':91 'hardwar':1,12,67,151 'heard':17 'increas':92 'infosec':189 'keepass':65 'keepassxc':45 'key':3,14,68,103,152 'know':63,148 'linux':117 'linux@lemmy.ml':182 'local':44 'm':175 'make':172 'mfa':187 'much':160,164 'need':146 'new':167 'opinion':38 'option':4,28 'os':121 'pass':138 'password':81,110 'pc':52 'person':75 'phone':54 'primari':120 'privacy@lemmy.ml':185 'proper':176 'ps':140 'replac':112 'right':87,101 'safest':84 'secur':2,13,93 'see':25 'setup':41 'still':76 'support':66,127 'sure':173 'sync':49 'talk':157 'technology@lemmy.ml':183 'technology@lemmy.world':184 'territori':168 'thing':144 'think':8 'togeth':106 'top':95 'totp':59 'unlock':70 'use':116 've':6 'want':23,170 'work':104,105 'worth':34 'yubikey':19,188"
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704402491
    +visibility: "visible             "
    +apId: "https://tsukihi.me/users/Scraft161/statuses/111694059376735181"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704316091 {#2808
      date: 2024-01-03 22:08:11.0 +01:00
    }
    +__isInitialized__: true
    +"title": 343
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1562 …}
  +parent: null
  +root: null
  +image: null
  +body: """
    I personally just have 3 u2f keys from different brands, one of them is a yubikey, but I only use the u2f functionality. I have read enough about the u2f standard to trust it, but the other fluff on some keys I don’t trust enoug in to use on my accounts, and the basic u2f functionality works perfectly on Linux (I even use it for my Linux login) and basically everywhere\n
    \n
    I keep one on my keychain(it has an USBA port, but I keep a female a to male c converter on it as cap so I can use it on my phone), another that has password protection instead of a single button lives on a port on my desktop and the third I keep stored, it is more annoying to set up all of them on a new account, but I know I won’t loose access or have to recover my accounts if I loose my keychain.\n
    \n
    And for sites that don’t support u2f I use Aegis for TOTP which would also be my recommendation, that way if your KeePassXC database is compromised your second factor is safe, and you can also have automatic encrypted backups of your Aegis dB synchronised across devices so you don’t loose them\n
    \n
    And if you are going to be setting up keys on multiple sites don’t forget to update or generate your single use recovery codes and store the safely, preferably on paper not digitally.\n
    \n
    I personally print mine on regular printer paper on sections about the size of a library card and then I spread some UV curing resin until it soaks through, then I clean the excess and leave them on the sun for about 2 hours (most printer paper has optical brightener that makes the resin much slower to cure). I then cut the individual segments and store them on my safe\n
    \n
    It may be paranoid, but it’s extra work just when creating an account, and I started doing it after I permanently lost access to a trading account because of a lost key and a faded recovery code, thankfully it had no balance stored there at the time
    """
  +lang: "en"
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1704373070 {#1672
    date: 2024-01-04 13:57:50.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@linux@lemmy.ml"
    "@technology@lemmy.ml"
    "@technology@lemmy.world"
    "@privacy@lemmy.ml"
    "@Scraft161@tsukihi.me"
    "@linux@lemmy.ml"
    "@technology@lemmy.ml"
    "@technology@lemmy.world"
    "@privacy@lemmy.ml"
    "@Scraft161@tsukihi.me"
    "@linux@lemmy.ml"
    "@technology@lemmy.ml"
    "@technology@lemmy.world"
    "@privacy@lemmy.ml"
    "@Scraft161@tsukihi.me"
  ]
  +isAdult: false
  +updateMark: false
  +children: Doctrine\ORM\PersistentCollection {#1563 …}
  +nested: Doctrine\ORM\PersistentCollection {#1564 …}
  +votes: Doctrine\ORM\PersistentCollection {#1559 …}
  +reports: Doctrine\ORM\PersistentCollection {#1567 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1556 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1571 …}
  -id: 1026
  -bodyTs: "'2':291 '3':5 'access':150,342 'account':52,142,156,332,346 'across':207 'aegi':172,204 'also':177,197 'annoy':132 'anoth':106 'automat':199 'backup':201 'balanc':361 'basic':55,71 'brand':10 'brighten':298 'button':115 'c':92 'cap':97 'card':265 'clean':280 'code':239,356 'compromis':188 'convert':93 'creat':330 'cure':272,306 'cut':309 'databas':186 'db':205 'desktop':122 'devic':208 'differ':9 'digit':248 'encrypt':200 'enoug':46 'enough':27 'even':63 'everywher':72 'excess':282 'extra':326 'factor':191 'fade':354 'femal':88 'fluff':38 'forget':230 'function':23,57 'generat':234 'go':219 'hour':292 'individu':311 'instead':111 'keep':74,86,127 'keepassxc':185 'key':7,41,224,351 'keychain':78,161 'know':145 'leav':284 'librari':264 'linux':61,68 'live':116 'login':69 'loos':149,159,213 'lost':341,350 'make':300 'male':91 'may':320 'mine':252 'much':303 'multipl':226 'new':141 'one':11,75 'optic':297 'paper':246,256,295 'paranoid':322 'password':109 'perfect':59 'perman':340 'person':2,250 'phone':105 'port':83,119 'prefer':244 'print':251 'printer':255,294 'protect':110 'read':26 'recommend':180 'recov':154 'recoveri':238,355 'regular':254 'resin':273,302 'safe':193,243,318 'second':190 'section':258 'segment':312 'set':134,222 'singl':114,236 'site':164,227 'size':261 'slower':304 'soak':276 'spread':269 'standard':31 'start':335 'store':128,241,314,362 'sun':288 'support':168 'synchronis':206 'thank':357 'third':125 'time':366 'totp':174 'trade':345 'trust':33,45 'u2f':6,22,30,56,169 'updat':232 'usba':82 'use':20,49,64,101,171,237 'uv':271 'way':182 'won':147 'work':58,327 'would':176 'yubikey':16"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/6399687"
  +editedAt: DateTimeImmutable @1711561401 {#1665
    date: 2024-03-27 18:43:21.0 +01:00
  }
  +createdAt: DateTimeImmutable @1704373070 {#1674
    date: 2024-01-04 13:57:50.0 +01:00
  }
  +"title": 1026
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS DENIED
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
9 DENIED ROLE_ADMIN
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
10 DENIED ROLE_MODERATOR
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details