Scraft161, to privacy
@Scraft161@tsukihi.me avatar

Hardware security key options?

I've been thinking about getting a hardware security key and have heard of yubikey before; but I want to see what my options are and if they are worth it in your opinion.
My current setup is a local KeePassXC database (that I sync between my PC and phone and also acts as TOTP authenticator app), I know that KeePass supports hardware keys for unlocking the database.

I am personally still of the belief that passwords are the safest when done right; but 2FA/MFA can greatly increase security on top of that (again, if done right).
The key work work together with already existing passwords, not replace them.

As I use linux as my primary OS I do expect it to support it and anything that doesn't I will have to pass on.

PS: what are the things I need to know about these hardware keys that's not being talked about too much, I am very much delving into new territory and want to make sure I'm properly educated before I delve in.

@linux @technology @technology @privacy

Sarcasmo220,

When I did some research on hardware keys I was between Yubikey and Nitrokey. I ended up going with Yubikey because KeepassXC supported it.

Something to keep in mind is purchasing a backup key. I bought one for my wife and we use each other’s as a backup.

For KeepassXC it does not support registering multiple keys (at least not that I have figured out), so I have a copy of my database where it uses my wife’s key as a backup.

stark, (edited )

In my research, I’ve found SoloKeys may be a US company. They are headquartered in New Jersey and one Co-founder is in New York City. However, according to their WhoIs data, the domain was registered in Iceland.

From SoloKey’s Solo 2A+ NFC Security Key product page “Made and programmed in Europe.” solokeys.com/products/solo-2a-nfc-security-key?va…

Wander, to privacyguides
@Wander@packmates.org avatar

Quick question about DNS and DoH that I thought about after reading this post:

https://packmates.org/@silvereagle@furry.engineer/111176886781705659

Wouldn't it make sense for Firefox or another third party to bundle and transparently forward all DoH requests to cloudflare so that:

A) Cloudflare doesn't know who made what request due to not knowing the origin

B) Firefox doesn't know who made what request due to TLS


CC: @privacyguides

AzzyDev,

Is it possible for devices to ask the pihole without doh, and the pi-hole to forward the request with doh if the domain isn’t in the cache?

FeelzGoodMan420,

I’m not an expert but I’m pretty sure no.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #