# Human brains are wholly inadequate for secrets ![](Human_Brain.png) ----------------------------------------------------------------------------- # What are hardware security tokens? ![Nano](YubiKey-5-Nano.png) ----------------------------------------------------------------------------- You should still use passwords. Two-factor authentication is stronger than one-factor authentication. Use strong passwords: randomly generated and long. Use password managers. Use a different password for every site, application, device. ----------------------------------------------------------------------------- # Why a Yubikey specifically ![Big](YubiKey-4.png) ----------------------------------------------------------------------------- # Use cases * web: U2F, WebAuthn * local: disks, login * OpenPGP (sign, encrypt) * SSH: via gpg-agent ----------------------------------------------------------------------------- # Demo * Use U2F for 2FA on gitlab.com. * Store GnuPG subkeys onto Yubikey * Configure GnuPG to use Yubikey - scdaemon ----------------------------------------------------------------------------- # SEE ALSO * [`https://github.com/drduh/YubiKey-Guide`](https://github.com/drduh/YubiKey-Guide>) * [`https://en.wikipedia.org/wiki/Password_strength`](https://en.wikipedia.org/wiki/Password_strength) * [`http://web.cs.wpi.edu/~guttman/cs557_website/ papers/passwords/MorrisThompsonPasswordSecurity.pdf`](http://web.cs.wpi.edu/~guttman/cs557_website/papers/passwords/MorrisThompsonPasswordSecurity.pdf) ----------------------------------------------------------------------------- # Legalese Copyright 2020 Wikimedia Foundation This content is licensed under the Creative Commons Attribution-ShareAlike 4.0 International ([CC BY-SA 4.0][]) licence. [CC BY-SA 4.0]: https://creativecommons.org/licenses/by-sa/4.0/ Images from Injurymap, , and Yubico.com. --- title: "Yubikey hardware security tokens" subtitle: "Lunch and learn" author: "Lars Wirzenius" date: "2020-09-28" ...