Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The Yubikey requires a password by default to use the ssh key stored on it and it will lock itself after 3 failed attempts. So I don’t think your caveat is valid. I rather have my encryption key on hardware design to keep anyone who finds it from brute forcing it than just password protected on a hard drive.


Yup you're right, I mixed up the PIV behavior with specifics around FIDO2 vs. U2F PIN policies.


It can also be configured to require a touch for every signing action or even one for multiple signing actions within a 15 second window I think it is




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: