this post was submitted on 11 Oct 2024
28 points (96.7% liked)
Privacy
31815 readers
367 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The firmware is indeed closed-source, so it's hard to audit. But they're popular, and a security flaw wouldn't go unnoticed for long.
There are other vendors such as NitroKey offers an alternative that offers both open source and audited hardware and software.
I personally went with a yubikey because their form factor is pretty slick. I'm not to worried about damaging the key.
Don't forget about SoloKeys!
Or OnlyKey
They're not entirely un-auditable, either. A security flaw was discovered in the Yubikey 5 in one of the IC modules from a supplier, and they patched all of their keys from that point forward.
Unfortunately, all the 5's from before May 2024 are unpatchable (by design to prevent thieves from having an easy way into the key), but any key purchased now should be fine.
Well shoot, I guess it’s time to get a new security key. Am I better off switching to a NitroKey?
That depends on your threat model. For most people, the attack is probably unlikely to affect them, but I would recommend reading about the flaw yourself. It's not hard to understand.
Also, this was not the fault of Yubico but a supplier, and instead of waiting for the supplier, Yubico patched the flaw themselves by providing a custom library.
Whether you should replace your current Yubikey 5 is up to you.
The issue isn't a big deal for the average user. The vulnerability required them to first get your username and password, physically steal your Yubikey, spend half a day using $10-15k worth of electronics equipment to repeatedly authenticate over and over, they then could potentially make a clone of the key.
Haha well I feel less concerned now
Thank you. I will look into it.