this post was submitted on 21 Mar 2024
111 points (98.3% liked)

Privacy

31893 readers
417 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

This isn't strictly a privacy question as a security one, so I'm asking this in the context of individuals, not organizations.

I currently use OTP 2FA everywhere I can, though some services I use support hardware security keys like the Yubikey. Getting a hardware key may be slightly more convenient since I wouldn't need to type anything in but could just press a button, but there's added risk with losing the key (I can easily backup OTP configs).

Do any of you use hardware security keys? If so, do you have a good argument in favor or against specific keys? (e.g. Yubikey, Nitrokey, etc)

you are viewing a single comment's thread
view the rest of the comments
[–] Gooey0210@sh.itjust.works 2 points 7 months ago (1 children)

It really depends on your thread model

In my opinion the fingerprint won't do any difference anyway

Who are we protecting against?

Hackers? They can't press the button

Thieves? They don't have your pin

Someone close who knows your pin? Maybe, but this is really an overkill

Evil maid? If somebody can pull up evil maid attack, they can hack the fingerprint anyway

Governments? They hack or force you to unlock it anyway


Summary: my opinion is that fingerprint is an overkill which doesn't protect from any real thread, but costs more and lacks some functions

[–] jet@hackertalks.com 1 points 7 months ago (1 children)

If I compromise your system. I can record the pin. Then I just need to steal the device.

[–] Gooey0210@sh.itjust.works 1 points 7 months ago

Think, who are you, and who am i?

I mean, how would you do it, and just why?

This is a very very very improbable scenario, too complicated, and too unlikely

There could be a thread model that would work with this feature well, but I don't think any of us even theoretically is one of those people that would benefit from it

Define your thread model, and work from it

Most of the people have two main threads: hackers, and thieves, not hacker-thieves