<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Key9 Identity]]></title><description><![CDATA[A Passkey based iDp.]]></description><link>https://blog.k9.io</link><image><url>https://substackcdn.com/image/fetch/$s_!vQV8!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa19ac172-dda2-4f0a-bd71-0e9da25f95c4_258x258.png</url><title>Key9 Identity</title><link>https://blog.k9.io</link></image><generator>Substack</generator><lastBuildDate>Wed, 06 May 2026 11:11:03 GMT</lastBuildDate><atom:link href="https://blog.k9.io/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Champ Clark III]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[key9@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[key9@substack.com]]></itunes:email><itunes:name><![CDATA[Champ Clark III]]></itunes:name></itunes:owner><itunes:author><![CDATA[Champ Clark III]]></itunes:author><googleplay:owner><![CDATA[key9@substack.com]]></googleplay:owner><googleplay:email><![CDATA[key9@substack.com]]></googleplay:email><googleplay:author><![CDATA[Champ Clark III]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Security Inequality Gap [Enterprise vs SMB]]]></title><description><![CDATA[How the SSO Tax Turned Small Businesses into Hacker Bait.]]></description><link>https://blog.k9.io/p/security-inequality-gap-enterprise</link><guid isPermaLink="false">https://blog.k9.io/p/security-inequality-gap-enterprise</guid><dc:creator><![CDATA[Champ Clark III]]></dc:creator><pubDate>Mon, 26 Jan 2026 19:05:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vQV8!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa19ac172-dda2-4f0a-bd71-0e9da25f95c4_258x258.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s fairly well documented that enterprise organizations have widely adopted MFA. This is a good thing, even if we put aside for a moment the fact that no two MFA solutions are alike. For example, some MFA solutions are inherently less secure than others. Another positive trend is that the enterprise is adopting passkeys at a higher rate. This is no surprise, as most enterprise-level organizations have the staff and support to roll out passkeys effectively. A FIDO Alliance study found that <strong>87%</strong> of organizations have either deployed or are currently deploying passkeys&#8212;a <strong>14% jump from just two years ago</strong>.</p><p>Enterprises are moving to passkeys to become phishing resistant, while small businesses&#8212;the backbone of the economy&#8212;are being left behind with SMS-based MFA that attackers can easily bypass.<em> This creates a &#8220;soft target&#8221; environment where hackers ignore the &#8220;fortress&#8221; (Enterprise) and feast on the &#8220;unprotected&#8221; (SMBs).</em></p><p>Within the SMB world, adoption of even simple MFA drops off a cliff. <strong>Only 27&#8211;34% of small businesses enforce MFA at all, and less than 5% of SMB-facing internal tools offer passkeys as an option.</strong></p><p>There are several reasons for this. For one, SMBs typically don&#8217;t have staff who understand or can handle the task of being an Identity and Access Management (IAM) administrator. Identity can be complex, requiring knowledge of OIDC, SAML2, SCIM, and more. Many small organizations don&#8217;t bother with IAM&#8212;and thus passkeys&#8212;because they simply don&#8217;t have the technical expertise.</p><p>One of the biggest challenges, and where I think many SaaS providers fail their customers, is the &#8220;<strong>SSO tax.</strong>&#8221; Even if a small organization decides to implement IAM, many tools will charge an extra &#8220;fee&#8221; simply for the right to use an SSO provider. I&#8217;ve heard many excuses for this. For example: &#8220;As a SaaS provider, we now have to keep up with the codebase for OIDC or SAML2.&#8221;</p><p>This strikes me as ridiculous. That statement implies that once an OIDC or SAML2 connector is built into a SaaS service, there is a massive, ongoing development effort required to maintain it. <em>This is simply not true.</em> I would argue that &#8220;rolling your own&#8221; auth is not only more complex but also creates more risk for the SaaS provider.</p><p>The bottom line is that SaaS providers know &#8220;enterprise&#8221; clients have deep pockets and will pay enterprise rates. What they really mean is that because authentication methods like OIDC and SAML2 are considered &#8220;enterprise-level,&#8221; they feel justified in charging enterprise-level rates. <strong>Translation: the enterprise will pay more, so we charge more. There is no other reason.</strong></p><p>To get around the &#8220;SSO tax,&#8221; some smaller identity players have decided to bypass it using automatic &#8220;<strong>form filling</strong>.&#8221; In this scenario, a legacy username and password form is presented to the user, and the credentials are automatically entered for them.</p><p>In most cases, this breaks the &#8220;<strong>Zero Trust</strong>&#8221; cycle. Many Identity Providers simply store the username and password within a database on their backend. This means that if they are compromised, those credentials could be exposed. Compare that to public key cryptography: even if a public key is exposed, there is no harm done.</p><p>A provider may tell you that they store usernames and passwords within &#8220;encrypted vaults.&#8221; That might be true, but encrypted or not, centralizing all credentials into one online &#8220;safe&#8221; creates a single, catastrophic point of failure. The LastPass hack, for example, led to millions of customer vaults being stolen. Attackers then searched the vaults for high-value targets by examining the URLs stored within. How did they get access to the URLs if the vaults were encrypted? <em>While the usernames and passwords were encrypted, the URLs were not.</em> Hosting millions of &#8220;vaults&#8221; made LastPass a massive target.</p><p>It is possible to create &#8220;encrypted local vault&#8221; systems that allow for automatic form filling and interact with your IdP, but these get complex and can still lead to other issues&#8212;such as the KeePass &#8220;memory dump&#8221; vulnerability (CVE-2023-32784).</p><p>On top of all this, with these systems, you are still using passwords!</p><p>Which leads us right back to public key cryptography (i.e., passkeys and SSH keys). While no system is 100% perfect, public key cryptography mitigates many of these vulnerabilities.</p><p>This is what Key9 is 100% built on. We&#8217;re trying to not only make the user experience seamless but create a <em>true</em> Zero Trust solution.</p><p>As I&#8217;ve seen in my decades-long experience in computer and network security, while we would like the road to lead toward more secure solutions, <strong>laziness and greed</strong> often keep us from getting there.</p><p>We hope that Key9 can be a small stepping stone in changing that.</p>]]></content:encoded></item><item><title><![CDATA[Passwords Are Out: Logging Into DigitalOcean with Key9]]></title><description><![CDATA[How to use Key9 to login and manage your DigitalOcean users.]]></description><link>https://blog.k9.io/p/passwords-are-out-logging-into-digitalocean</link><guid isPermaLink="false">https://blog.k9.io/p/passwords-are-out-logging-into-digitalocean</guid><dc:creator><![CDATA[Champ Clark III]]></dc:creator><pubDate>Wed, 17 Dec 2025 18:00:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vQV8!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa19ac172-dda2-4f0a-bd71-0e9da25f95c4_258x258.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>We have long been fans of <a href="https://digitalocean.com">DigitalOcean</a>, utilizing its services for many years as developers. It offers a clean and simple platform that developers and hackers appreciate. Whether you need a Linux development box or a quick MariaDB database, DigitalOcean allows you to deploy resources in minutes without dealing with overly complicated interfaces. It&#8217;s a straightforward point-click experience.</p><p>DigitalOcean resources are remarkably stable. Throughout our many years of using their platform, we have never encountered stability issues regarding connectivity, uptime, or bandwidth. Beyond technical stability, their pricing is also stable, transparent, and easy to understand, which is a significant benefit for both developers and users.</p><p>My main gripe with DigitalOcean had been the absence of Single Sign-On (SSO) capabilities. Because DigitalOcean lacked support for SAML2 or OpenID Connect (OIDC), every one of our developers was forced to maintain their own separate account.</p><p>The lack of SSO leads to user &#8220;sprawl,&#8221; which significantly complicates the platform&#8217;s adoption for enterprise customers. In previous roles, I&#8217;ve encountered environments where applications absolutely had to support SSO; if they didn&#8217;t, they were not permitted within the system.</p><p>On September 2nd, 2025, DigitalOcean announced SSO functionality!</p><p>This update allows teams to integrate with OIDC-compatible identity providers (IdPs), such as <a href="https://k9.io">Key9</a>, to manage user authentication for the DigitalOcean control panel. This integration is a significant step for organizations, as it enhances security protocols and streamlines user access by centralizing credential management through a trusted, single service.</p><p>Key9 enhances DigitalOcean&#8217;s appeal by offering a completely passwordless platform. Since all authentication is managed through Passkeys, developers can focus on writing code instead of struggling with usernames, passwords, and MFA.</p><p>It&#8217;s easy to get started using DigitalOcean with Key9. You can find DigitalOcean support directly in the Key9 &#8220;Market Place.&#8221; For detailed information, please refer to the documentation at:</p><p><a href="https://docs.k9.io/key9-identity/web/marketplace/digitalocean">https://docs.k9.io/key9-identity/web/marketplace/digitalocean</a></p><p><a href="https://docs.k9.io/key9-identity/web/marketplace/digitalocean">https://docs.digitalocean.com/platform/teams/how-to/configure-sso/</a></p>]]></content:encoded></item><item><title><![CDATA[Go provision yourself. ]]></title><description><![CDATA[Onboarding users in a passwordless world.]]></description><link>https://blog.k9.io/p/go-provision-yourself</link><guid isPermaLink="false">https://blog.k9.io/p/go-provision-yourself</guid><dc:creator><![CDATA[Champ Clark III]]></dc:creator><pubDate>Wed, 26 Mar 2025 13:30:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/E2MbXuJm7aw" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Onboarding new users to an Identity platform (iDp) shouldn&#8217;t be challenging. As the first fully Passkey-driven Identity and Access Management platform, we can rethink the onboarding experience. While transitioning to a completely &#8220;passwordless&#8221; environment may seem daunting, it&#8217;s actually straightforward and can be streamlined for ease of use.</p><p>At Key9, we have a concept called "provisioned users." This is an innovative approach to setting up new users in a highly secure manner. To illustrate, let&#8217;s consider an example company that uses Key9 as its identity provider (iDp) and YubiKeys to secure its network and applications.</p><p>As a Key9 administrator, you can have a Yubikey shipped directly to the user&#8217;s location and send a registration &#8220;magic link.&#8221; While this process works, it requires users to undertake quite a bit of effort to set up their own Yubikey, which can be confusing, especially for new users. </p><p><em>Ultimately, passwordless technology should simplify the experience, not complicate it further.</em></p><p>At Key9,  an alternative method is available. When the administrator sets up a new user, they can enable the &#8220;Provisioning user?&#8221; option.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hLtQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a74ea8-99e3-4f34-af30-7b044a12d74a_328x63.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hLtQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a74ea8-99e3-4f34-af30-7b044a12d74a_328x63.png 424w, https://substackcdn.com/image/fetch/$s_!hLtQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a74ea8-99e3-4f34-af30-7b044a12d74a_328x63.png 848w, https://substackcdn.com/image/fetch/$s_!hLtQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a74ea8-99e3-4f34-af30-7b044a12d74a_328x63.png 1272w, https://substackcdn.com/image/fetch/$s_!hLtQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a74ea8-99e3-4f34-af30-7b044a12d74a_328x63.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hLtQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a74ea8-99e3-4f34-af30-7b044a12d74a_328x63.png" width="328" height="63" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/84a74ea8-99e3-4f34-af30-7b044a12d74a_328x63.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:63,&quot;width&quot;:328,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hLtQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a74ea8-99e3-4f34-af30-7b044a12d74a_328x63.png 424w, https://substackcdn.com/image/fetch/$s_!hLtQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a74ea8-99e3-4f34-af30-7b044a12d74a_328x63.png 848w, https://substackcdn.com/image/fetch/$s_!hLtQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a74ea8-99e3-4f34-af30-7b044a12d74a_328x63.png 1272w, https://substackcdn.com/image/fetch/$s_!hLtQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a74ea8-99e3-4f34-af30-7b044a12d74a_328x63.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>This informs Key9 that you wish to bypass the standard verification processes. While this may initially seem less secure, it actually isn't.</p><p>When this option is enabled, the administrator can set up the user as usual by assigning privileges and groups. However, the administrator also has the option to pre-configure the Yubikey.</p><p>For instance, after entering all the user&#8217;s information, the administrator can insert a new Yubikey into their workstation. At that point, the administrator can assign a PIN to the Yubikey and generate a Passkey for the user.  Don&#8217;t worry; later,  we&#8217;ll discuss how the PIN plays into the secure transfer. </p><p>Key9 will manage the public key as usual, while the YubiKey will securely store the private key. The design of YubiKeys ensures that even administrators cannot access the private key, providing an additional layer of protection.</p><p>After the user has been created and assigned a pre-generated Passkey stored on the Yubikey, the physical key must be transferred to the user.</p><p>In certain situations, handing over a Yubikey to a user can be as simple as meeting them in person and providing the PIN. This process is reminiscent of the old "key signing parties." The idea is that when you are face-to-face with someone, you can be confident that the Yubikey has been received by the right person.</p><p>In other situations, this may not hold true. This is where we can use the PIN code to help facilitate the transfer.</p><p>Imagine a situation where a user is in a different city or country. In this case, the administrator would mail the physical key to the user, along with a note advising them to contact the administrator upon receiving the key. Importantly, the administrator would <em><strong>not</strong></em> include the PIN for that key in the package. Instead, the PIN code would be communicated through a separate, secure method (out-of-bands).</p><p>The idea is that if the key is intercepted by someone other than the intended user, the PIN serves as a safeguard to prevent unauthorized access. By default, YubiKeys allow up to eight attempts to enter the correct PIN. If the correct PIN is not entered after these attempts, the FIDO2 applications will block further access, and the key must be reset.</p><p>Additionally, after every third failed attempt in a row, the YubiKey must be physically removed and reinserted into the device. This design helps prevent brute-force attacks on the physical key.</p><p>Once the user successfully receives their Yubikey, they should notify the administrator. The administrator will then use a pre-established communication method to relay the PIN code to the Yubikey.</p><p>For instance, if the user calls the administrator to request the Yubikey PIN, the <em>administrator cannot provide it during that call</em>. Instead, they must hang up and call back using a <em>predetermined</em> phone number to transfer the PIN securely. This prevents social engineering to gaining access to the PIN number.</p><p>This is a simple example. An administrator can share the PIN with the user in several ways. For instance, they could use encrypted email or a predetermined instant messaging service like Signal.</p><p>The final issue to address is the possibility that the administrator may know all the YubiKey PINs. Fortunately, this can be easily resolved. Users can change their PINs using the built-in security key tools in Windows 11 or the security key management tools available in web browsers like Google Chrome. This means users can update their PINs without installing any third-party software.</p><p>In this example, we&#8217;re using YubiKeys as a reference, but any FIDO2 hardware token will work just as well. You can envision this as an &#8220;onboarding&#8221; process for company laptops. The main idea is to pre-register a Passkey for each computer before shipping it out.</p><p>I&#8217;ve made a short video to show you how the process works.  You can watch it on Youtube below:</p><div id="youtube2-E2MbXuJm7aw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;E2MbXuJm7aw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/E2MbXuJm7aw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Passwordless technology is essential; it not only streamlines the onboarding process for new users but also significantly strengthens security.</p>]]></content:encoded></item><item><title><![CDATA[The 2025 Security Key Shootout!]]></title><description><![CDATA[Best & worst hardware security keys to store Passkeys and SSH keys. [Updated 04/22/2025]]]></description><link>https://blog.k9.io/p/key9-the-2025-security-key-shootout</link><guid isPermaLink="false">https://blog.k9.io/p/key9-the-2025-security-key-shootout</guid><dc:creator><![CDATA[Champ Clark III]]></dc:creator><pubDate>Wed, 12 Mar 2025 13:03:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!8lM0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I've been a strong advocate for the "passwordless" approach for some time now. Before fully embracing it, I had a diverse collection of hardware security tokens. Since founding Key9 Identity (<a href="https://k9.io">https://k9.io</a>) &#8212;a company entirely focused on Passkeys and FIDO2&#8212;I have developed an increasing obsession with security keys. I'm always looking for new implementations and affordable alternatives to the leading options in the market.</p><p>I have just a few criteria defining a good security key.</p><p>First and foremost, the key must support Passkeys. I prefer it to have a reasonable number of slots to store Passkeys. In my opinion, security keys that can only store 10 Passkeys are nearly useless. </p><p>While not a &#8220;hard&#8221; requirement, it would be nice if the security key supported SSH. In particular, the ed25519-sk cryptographic algorithm. At the very least, it should support ecdsa-sk. Both ed25519-sk and ecdsa-sk are considered secure, but ed25519-sk is more resistant to potential attacks and is considered a more robust cryptographic algorithm. It&#8217;s also faster, but not so much that you would ever notice.</p><p>I see many nerds, like myself, screaming that ed25519-sk is the best choice when using SSH. That is true, but remember that ecdsa-sk is far superior to passwords.</p><p>The security key needs to be durable. Several of my security keys have passed through the washer and dryer multiple times, and flimsy security enclosures can and will be broken. These devices are meant to be on your key chain or pocket. If they can&#8217;t hold up to different levels of torture, then they aren&#8217;t for me. On the other hand, cheap keys that can&#8217;t hold up to physical pressure might be acceptable as a &#8220;backup&#8221; in a safe or safety deposit box.</p><p>Price typically isn&#8217;t an issue for personal use. However, if you are an organization planning to roll out Passkeys and need many security keys, price becomes a significant concern. With this in mind, I am testing the most affordable keys I can find.</p><p>Finally, I prefer not to install third-party security key software. Their software is usually unnecessary; many people are unaware of this.</p><p>For example, when you purchase a new security key, it typically does not have a PIN set. Many security key manufacturers recommend installing their software to set up the PIN. However, this is not necessary. When you register your first Passkey, most web browsers will recognize that you don&#8217;t have a PIN and will allow you to set one before registering your Passkey.</p><p>Not having to install third-party software (bloatware) allows you to set up Passkeys more quickly.</p><p>Sometimes, you may want to review what is stored on your security key or delete some old entries to free up Passkey slots.</p><p>Few people seem aware that web browsers like Google Chrome and Chromium provide options for managing &#8220;security keys.&#8221; You can find this feature in Chrome/Chromium by navigating to <em><strong>Privacy and security -&gt; Security -&gt; Manage security keys</strong></em>.</p><p>Once there, you can create or change your PIN and manage all your sign-in data. For example, you can remove old Passkeys and SSH keys from your hardware security token. If your key supports biometrics, you can manage fingerprints as well. Additionally, you can reset your security key, which will erase all data on the device.</p><p>We will see browsers and operating systems directly supporting security keys in the future. This is because FIDO2 security keys generally function similarly across different platforms, except when they don&#8217;t. Then you'll need to use the software provided by the security key manufacturers. The usability and quality of this third-party software can vary significantly. For instance, some security key manufacturers' software might only be compatible with Windows 11. If you have one of these keys, you'll need access to a Windows 11 machine to manage it, although it will likely still function on Linux and macOS.</p><p>We are getting closer to managing our FIDO2 keys directly within the operating system or browser. I, for one, will look forward to that day.</p><p>With those conditions and rules in place, let's get started!</p><div><hr></div><h2>Token2 T2F2-Dual PIN+Octo FIDO2.1 Security Key - Nonbranded</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8lM0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8lM0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png 424w, https://substackcdn.com/image/fetch/$s_!8lM0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png 848w, https://substackcdn.com/image/fetch/$s_!8lM0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png 1272w, https://substackcdn.com/image/fetch/$s_!8lM0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8lM0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png" width="420" height="524.018691588785" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:801,&quot;width&quot;:642,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:732301,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8lM0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png 424w, https://substackcdn.com/image/fetch/$s_!8lM0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png 848w, https://substackcdn.com/image/fetch/$s_!8lM0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png 1272w, https://substackcdn.com/image/fetch/$s_!8lM0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5983b521-3246-45aa-9233-4d5b8f5d9ca5_642x801.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_OUx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663837d8-f81c-4b97-9068-81019c237025_581x793.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_OUx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663837d8-f81c-4b97-9068-81019c237025_581x793.png 424w, https://substackcdn.com/image/fetch/$s_!_OUx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663837d8-f81c-4b97-9068-81019c237025_581x793.png 848w, https://substackcdn.com/image/fetch/$s_!_OUx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663837d8-f81c-4b97-9068-81019c237025_581x793.png 1272w, https://substackcdn.com/image/fetch/$s_!_OUx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663837d8-f81c-4b97-9068-81019c237025_581x793.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_OUx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663837d8-f81c-4b97-9068-81019c237025_581x793.png" width="421" height="574.6179001721171" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/663837d8-f81c-4b97-9068-81019c237025_581x793.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:793,&quot;width&quot;:581,&quot;resizeWidth&quot;:421,&quot;bytes&quot;:684139,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663837d8-f81c-4b97-9068-81019c237025_581x793.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_OUx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663837d8-f81c-4b97-9068-81019c237025_581x793.png 424w, https://substackcdn.com/image/fetch/$s_!_OUx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663837d8-f81c-4b97-9068-81019c237025_581x793.png 848w, https://substackcdn.com/image/fetch/$s_!_OUx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663837d8-f81c-4b97-9068-81019c237025_581x793.png 1272w, https://substackcdn.com/image/fetch/$s_!_OUx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663837d8-f81c-4b97-9068-81019c237025_581x793.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Brand:</strong> Token2</p><p><strong>Link:</strong> <a href="https://token2.com/shop/product/token2-t2f2-dual-pin-octo-fido2-1-security-key-nonbranded">https://token2.com/shop/product/token2-t2f2-dual-pin-octo-fido2-1-security-key-nonbranded</a></p><p><strong>Price:</strong> &#8364;25.00 ($28.43 USD on 2025/04/21)</p><p><strong>Storage:</strong> 300</p><p><strong>Support</strong>: FIDO U2F + FIDO2.1 WebAuthn + HOTP (HID) + TOTP</p><p><strong>SSH Support:</strong> ed25519-sk and ecsda-sk</p><p><strong>Software/Manual:  </strong><a href="https://token2.com/shop/product/token2-t2f2-dual-pin-octo-fido2-1-security-key-nonbranded">https://token2.com/shop/product/token2-t2f2-dual-pin-octo-fido2-1-security-key-nonbranded</a></p><p><strong>Pros:</strong>  NFC,  SSH support,  great design.  No third-party software needed (worked fine in Google Chrome).  Great price.  Great functionality. </p><p><strong>Cons:</strong>  Worried about the keyring hole.   Shipping costs to the United States. </p><p><strong>Linux &#8220;dmesg&#8221;: </strong></p><p><code>[1187114.633013] usb 1-6: New USB device found, idVendor=349e, idProduct=0022, bcdDevice= 1.00</code></p><p><code>[1187114.633038] usb 1-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0</code></p><p><code>[1187114.633046] usb 1-6: Product: FIDO2 Security Key</code></p><p><code>[1187114.633052] usb 1-6: Manufacturer: TOKEN2</code></p><p><code>[1187114.639474] input: TOKEN2 FIDO2 Security Key as /devices/pci0000:00/0000:00:14.0/usb1/1-6/1-6:1.0/0003:349E:0022.000A/input/input23</code></p><p><code>[1187114.723975] hid-generic 0003:349E:0022.000A: input,hidraw1: USB HID v1.10 Keyboard [TOKEN2 FIDO2 Security Key] on usb-0000:00:14.0-6/input0</code></p><p><code>[1187114.726111] hid-generic 0003:349E:0022.000B: hiddev0,hidraw2: USB HID v1.10 Device [TOKEN2 FIDO2 Security Key] on usb-0000:00:14.0-6/input1</code></p><p><strong>Linux &#8220;lsusb&#8221;:</strong></p><p><code>Bus 001 Device 008: ID 349e:0022 TOKEN2 FIDO2 Security Key</code></p><h4>Experience: </h4><p>Shortly after originally posting these reviews, I received a message from &#8220;<em>Imightbenormal</em>&#8221; on Reddit asking, &#8220;Have you looked at token2.com?&#8221;</p><p>I hadn't, and I'm thrilled he reached out to me. In almost every category, this key hits the mark. It supports everything I need, the price is reasonable, and it is well-built.</p><p>One aspect I appreciated was Token2's transparency regarding the specifications of their keys. When visiting their website to purchase a key, all the information is clearly presented and easy to find. Unlike many manufacturers who bury specifications in lengthy PDFs that require extensive searching, Token2 displays the key specifications right on the same page as the &#8220;Add to Basket&#8221; button. I appreciated this very much.</p><p>This design features both USB-C and USB-A ports. It is similar to the Thetis Pro FIDO2 Security key, but offers a superior, more compact design.</p><p>The overall design and feel of the device are solid. While it doesn't feel quite as robust as the YubiKey 5C, it is still quite close. I do have some concerns about the hole for the key ring. On their website, they clearly state that you should use keyrings that are 2mm or thinner. The device is designed to &#8220;tolerate&#8221; a force of 80-100 Newtons, which translates to about 18-22 pounds for those in the United States. For forces exceeding this range, they recommend using a silicone case, which can be purchased for a few extra dollars.</p><p>This key has a good chance of passing the &#8220;clothes washer&#8221; test. The casing feels solid, and their site indicates that the PCB (Printed Circuit Board) is coated to protect against water ingress.</p><p>You may have noticed that this key is "unbranded," meaning one side is blank. This blank side can be laser-engraved with a logo of your choice at no extra cost. To do this, simply provide the Token2 team with your logo in SVG format, ensuring it is in a 1:1 ratio.</p><p><em>How cool is that!</em></p><p>One impressive feature of this key is that it requires users to set a PIN of at least 8 characters right from the start. Additionally, it prevents users from choosing easily guessable PINs, such as sequences like "12345678." I have not encountered any other security key vendor that offers this level of protection.  </p><p>This is a crucial security feature that businesses and organizations should prioritize.</p><p>The key can be easily set up without the need for third-party software installation. I successfully managed the security settings from within Google Chrome. As mentioned earlier, the key prevents users from entering a PIN that is easily guessable. I tested this feature by attempting to use a short PIN. As expected, I was informed that the PIN was too short. This is not surprising, as other keys have similar limitations. I then tried entering the PIN &#8220;12345678,&#8221; but the Chrome security manager returned the error, &#8220;PIN operation failed with code 55.&#8221;</p><p>It prevented me from using a PIN that was easy to guess.</p><p>As mentioned, I haven't observed this feature being enforced on any other key out of the box. Additional information about PIN complexity can be found at <a href="https://www.token2.com/site/page/token2-fido2-pin-see-the-pin-complexity-in-action">https://www.token2.com/site/page/token2-fido2-pin-see-the-pin-complexity-in-action</a>.</p><p>One downside that is beyond the control of the Token2 team is the shipping costs, which you should factor into your budget if you plan to use these keys. However, the Token2 team was quick to respond to my inquiries, and they are open to offering discounts for bulk purchases of keys.</p><p>This key not only met my specifications but also exceeded them. For instance, the NFC functionality worked exceptionally well with this key.</p><p><em><strong>This has been my favorite security key.</strong></em></p><p>This key is manufactured in Switzerland. See the Token2 FAQ for more details: <a href="https://www.token2.com/site/page/faq-hardware-tokens">https://www.token2.com/site/page/faq-hardware-tokens</a></p><div><hr></div><h3><strong>T2F2-PIN+ Release3 TypeC</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pqGw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ff6cc32-9496-4181-9553-1097384ee302_724x844.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pqGw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ff6cc32-9496-4181-9553-1097384ee302_724x844.png 424w, https://substackcdn.com/image/fetch/$s_!pqGw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ff6cc32-9496-4181-9553-1097384ee302_724x844.png 848w, https://substackcdn.com/image/fetch/$s_!pqGw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ff6cc32-9496-4181-9553-1097384ee302_724x844.png 1272w, https://substackcdn.com/image/fetch/$s_!pqGw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ff6cc32-9496-4181-9553-1097384ee302_724x844.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pqGw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ff6cc32-9496-4181-9553-1097384ee302_724x844.png" width="420" height="489.6132596685083" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7ff6cc32-9496-4181-9553-1097384ee302_724x844.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:844,&quot;width&quot;:724,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:833585,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ff6cc32-9496-4181-9553-1097384ee302_724x844.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pqGw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ff6cc32-9496-4181-9553-1097384ee302_724x844.png 424w, https://substackcdn.com/image/fetch/$s_!pqGw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ff6cc32-9496-4181-9553-1097384ee302_724x844.png 848w, https://substackcdn.com/image/fetch/$s_!pqGw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ff6cc32-9496-4181-9553-1097384ee302_724x844.png 1272w, https://substackcdn.com/image/fetch/$s_!pqGw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ff6cc32-9496-4181-9553-1097384ee302_724x844.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HyAk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6fe1cc3-c883-45e9-8066-ade94b4af6c3_711x826.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HyAk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6fe1cc3-c883-45e9-8066-ade94b4af6c3_711x826.png 424w, https://substackcdn.com/image/fetch/$s_!HyAk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6fe1cc3-c883-45e9-8066-ade94b4af6c3_711x826.png 848w, https://substackcdn.com/image/fetch/$s_!HyAk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6fe1cc3-c883-45e9-8066-ade94b4af6c3_711x826.png 1272w, https://substackcdn.com/image/fetch/$s_!HyAk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6fe1cc3-c883-45e9-8066-ade94b4af6c3_711x826.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HyAk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6fe1cc3-c883-45e9-8066-ade94b4af6c3_711x826.png" width="421" height="489.0942334739803" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d6fe1cc3-c883-45e9-8066-ade94b4af6c3_711x826.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:826,&quot;width&quot;:711,&quot;resizeWidth&quot;:421,&quot;bytes&quot;:731349,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6fe1cc3-c883-45e9-8066-ade94b4af6c3_711x826.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HyAk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6fe1cc3-c883-45e9-8066-ade94b4af6c3_711x826.png 424w, https://substackcdn.com/image/fetch/$s_!HyAk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6fe1cc3-c883-45e9-8066-ade94b4af6c3_711x826.png 848w, https://substackcdn.com/image/fetch/$s_!HyAk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6fe1cc3-c883-45e9-8066-ade94b4af6c3_711x826.png 1272w, https://substackcdn.com/image/fetch/$s_!HyAk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6fe1cc3-c883-45e9-8066-ade94b4af6c3_711x826.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Brand:</strong> Token2</p><p><strong>Link:</strong> <a href="https://token2.com/shop/product/t2f2-pin-release3-typec">https://token2.com/shop/product/t2f2-pin-release3-typec</a></p><p><strong>Price:</strong> USB-C &#8364;21.50 ($24.45 USD), USB-A &#8364;20.50 ($23.31 USD on 2025/04/21)</p><p><strong>Storage:</strong> 300</p><p><strong>Support</strong>: FIDO U2F + FIDO2.1 WebAuthn + HOTP (HID) + TOTP</p><p><strong>SSH Support:</strong> ed25519-sk and ecsda-sk</p><p><strong>Software/Manual:  </strong><a href="https://token2.com/shop/product/t2f2-pin-release3-typec">https://token2.com/shop/product/t2f2-pin-release3-typec</a></p><p><strong>Pros:</strong>  NFC,  SSH support,  great design.  No third-party software is needed (it works fine in Google Chrome).  Great price.  Great functionality. </p><p><strong>Cons:</strong>  Shipping costs to the United States. </p><p><strong>Linux &#8220;dmesg&#8221;: </strong></p><p><code>[1187229.041292] usb 1-6: New USB device found, idVendor=349e, idProduct=0026, bcdDevice= 1.00</code></p><p><code>[1187229.041314] usb 1-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0</code></p><p><code>[1187229.041320] usb 1-6: Product: FIDO2 Security Key(0026)</code></p><p><code>[1187229.041325] usb 1-6: Manufacturer: TOKEN2</code></p><p><code>[1187229.046828] input: TOKEN2 FIDO2 Security Key(0026) as /devices/pci0000:00/0000:00:14.0/usb1/1-6/1-6:1.0/0003:349E:0026.000C/input/input24</code></p><p><code>[1187229.127439] hid-generic 0003:349E:0026.000C: input,hidraw1: USB HID v1.10 Keyboard [TOKEN2 FIDO2 Security Key(0026)] on usb-0000:00:14.0-6/input0</code></p><p><code>[1187229.129664] hid-generic 0003:349E:0026.000D: hiddev0,hidraw2: USB HID v1.10 Device [TOKEN2 FIDO2 Security Key(0026)] on usb-0000:00:14.0-6/input1</code></p><p><strong>Linux &#8220;lsusb&#8221;:</strong></p><p><code>Bus 001 Device 009: ID 349e:0026 TOKEN2 FIDO2 Security Key(0026)</code></p><h4>Experience:</h4><p>This key shares many of the same features mentioned above. However, it is priced slightly lower and supports either USB-C or USB-A, depending on the model you choose. For a better understanding of the features this key offers, please refer to the section titled &#8220;Token2 T2F2-Dual PIN+Octo FIDO2.1 Security Key - Nonbranded&#8221; above.</p><p>I will discuss some of the differences and share my thoughts on them.</p><p>The overall feel of the key is solid, though it is slightly less sturdy than the YubiKey 5C. Additionally, this key is somewhat smaller than the YubiKey 5C. In comparison to the &#8220;Token2 T2F2-Dual PIN,&#8221; the keyhole on this key feels much more solid.</p><p>These keys don&#8217;t use a &#8220;button,&#8221; per se. Instead of &#8220;pressing&#8221; anything, you simply &#8220;touch&#8221; the exposed metal part of the key to confirm your presence.</p><p>The &#8220;Token2 T2F2-Dual&#8221; enforces an 8-digit PIN and prevents users from using easily guessable PINs. This key also stops users from setting PINs that are easy to guess, with a minimum PIN length of 6 digits.</p><p>The specifications are very similar to those of the &#8220;Token2 T2F2-Dual.&#8221; However, there are some differences:</p><ul><li><p>Less worried about the keyhole.</p></li><li><p>Key will only support USB-A or USB-C (not both)</p></li><li><p>The minimum PIN is 6 digits, instead of 8.</p></li><li><p>The form factor is smaller.</p><p></p></li></ul><p>This key is manufactured in Switzerland. See the Token2 FAQ for more details: <a href="https://www.token2.com/site/page/faq-hardware-tokens">https://www.token2.com/site/page/faq-hardware-tokens</a></p><div><hr></div><h2><strong>Identiv - uTrust FIDO2 NFC</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!H1Qe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe03de15-0dcc-413b-9318-b676b7a60677_3024x4032.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H1Qe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe03de15-0dcc-413b-9318-b676b7a60677_3024x4032.jpeg 424w, https://substackcdn.com/image/fetch/$s_!H1Qe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe03de15-0dcc-413b-9318-b676b7a60677_3024x4032.jpeg 848w, https://substackcdn.com/image/fetch/$s_!H1Qe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe03de15-0dcc-413b-9318-b676b7a60677_3024x4032.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!H1Qe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe03de15-0dcc-413b-9318-b676b7a60677_3024x4032.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H1Qe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe03de15-0dcc-413b-9318-b676b7a60677_3024x4032.jpeg" width="420" height="559.9038461538462" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/be03de15-0dcc-413b-9318-b676b7a60677_3024x4032.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:3370140,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe03de15-0dcc-413b-9318-b676b7a60677_3024x4032.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!H1Qe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe03de15-0dcc-413b-9318-b676b7a60677_3024x4032.jpeg 424w, https://substackcdn.com/image/fetch/$s_!H1Qe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe03de15-0dcc-413b-9318-b676b7a60677_3024x4032.jpeg 848w, https://substackcdn.com/image/fetch/$s_!H1Qe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe03de15-0dcc-413b-9318-b676b7a60677_3024x4032.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!H1Qe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe03de15-0dcc-413b-9318-b676b7a60677_3024x4032.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zr6n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7927e7dd-c38b-45b7-8f07-56de5cf80bbf_618x960.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zr6n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7927e7dd-c38b-45b7-8f07-56de5cf80bbf_618x960.png 424w, https://substackcdn.com/image/fetch/$s_!zr6n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7927e7dd-c38b-45b7-8f07-56de5cf80bbf_618x960.png 848w, https://substackcdn.com/image/fetch/$s_!zr6n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7927e7dd-c38b-45b7-8f07-56de5cf80bbf_618x960.png 1272w, https://substackcdn.com/image/fetch/$s_!zr6n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7927e7dd-c38b-45b7-8f07-56de5cf80bbf_618x960.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zr6n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7927e7dd-c38b-45b7-8f07-56de5cf80bbf_618x960.png" width="420" height="652.4271844660194" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7927e7dd-c38b-45b7-8f07-56de5cf80bbf_618x960.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:960,&quot;width&quot;:618,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:1057015,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7927e7dd-c38b-45b7-8f07-56de5cf80bbf_618x960.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zr6n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7927e7dd-c38b-45b7-8f07-56de5cf80bbf_618x960.png 424w, https://substackcdn.com/image/fetch/$s_!zr6n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7927e7dd-c38b-45b7-8f07-56de5cf80bbf_618x960.png 848w, https://substackcdn.com/image/fetch/$s_!zr6n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7927e7dd-c38b-45b7-8f07-56de5cf80bbf_618x960.png 1272w, https://substackcdn.com/image/fetch/$s_!zr6n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7927e7dd-c38b-45b7-8f07-56de5cf80bbf_618x960.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cb0D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F193893ee-2f9b-4132-b7fd-4379b3e8019b_594x1006.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cb0D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F193893ee-2f9b-4132-b7fd-4379b3e8019b_594x1006.png 424w, https://substackcdn.com/image/fetch/$s_!cb0D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F193893ee-2f9b-4132-b7fd-4379b3e8019b_594x1006.png 848w, https://substackcdn.com/image/fetch/$s_!cb0D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F193893ee-2f9b-4132-b7fd-4379b3e8019b_594x1006.png 1272w, https://substackcdn.com/image/fetch/$s_!cb0D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F193893ee-2f9b-4132-b7fd-4379b3e8019b_594x1006.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cb0D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F193893ee-2f9b-4132-b7fd-4379b3e8019b_594x1006.png" width="420" height="711.3131313131313" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/193893ee-2f9b-4132-b7fd-4379b3e8019b_594x1006.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1006,&quot;width&quot;:594,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:1083314,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F193893ee-2f9b-4132-b7fd-4379b3e8019b_594x1006.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cb0D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F193893ee-2f9b-4132-b7fd-4379b3e8019b_594x1006.png 424w, https://substackcdn.com/image/fetch/$s_!cb0D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F193893ee-2f9b-4132-b7fd-4379b3e8019b_594x1006.png 848w, https://substackcdn.com/image/fetch/$s_!cb0D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F193893ee-2f9b-4132-b7fd-4379b3e8019b_594x1006.png 1272w, https://substackcdn.com/image/fetch/$s_!cb0D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F193893ee-2f9b-4132-b7fd-4379b3e8019b_594x1006.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Brand:</strong> IDENTIV</p><p><strong>Link:</strong> <a href="https://www.amazon.com/dp/B0C6YRJ7Y7">https://www.amazon.com/dp/B0C6YRJ7Y7</a></p><p><strong>Price:</strong> $16.50</p><p><strong>Storage:</strong> unknown</p><p><strong>Support</strong>: Supports FIDO2,  U2F, and WebAuth. Support for OTP and PIV is enabled for specific use cases.</p><p><strong>SSH Support:</strong> No</p><p><strong>Software/Manual:  </strong><a href="https://www.hirschsecure.com/filesimages/LACS/uTrust_Key_Manager_Software_UserManual_Identity.pdf">https://www.hirschsecure.com/filesimages/LACS/uTrust_Key_Manager_Software_UserManual_Identity.pdf</a></p><p><a href="https://www.hirschsecure.com/products/identity-smart-card-readers/utrust-fido2-security-keys/utrust-key-manager-software">https://www.hirschsecure.com/products/identity-smart-card-readers/utrust-fido2-security-keys/utrust-key-manager-software</a></p><p><strong>Pros:</strong> NFC was functional.</p><p><strong>Cons:</strong> I would NOT use it as a daily driver. The Button is deep and challenging to get to&nbsp;<em>and&nbsp;doesn&#8217;t support the built-in web browser/OS setup</em>. Had to load third-party software to get the key functional.   I found this key flaky to use. </p><p><strong>Linux &#8220;dmesg&#8221;: </strong></p><p><code>[82711.528268] usb 1-4: New USB device found, idVendor=04e6, idProduct=5a11, bcdDevice= 0.01</code></p><p><code>[82711.528289] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=0</code></p><p><code>[82711.528295] usb 1-4: Product: uTrust FIDO2 Security Key</code></p><p><code>[82711.528300] usb 1-4: Manufacturer: Identiv</code></p><p><code>[82711.534180] hid-generic 0003:04E6:5A11.0004: hiddev0,hidraw1: USB HID v1.11 Device [Identiv uTrust FIDO2 Security Key] on usb-0000:00:14.0-4/input1</code></p><p><code>[82711.535214] input: Identiv uTrust FIDO2 Security Key as /devices/pci0000:00/0000:00:14.0/usb1/1-4/1-4:1.2/0003:04E6:5A11.0005/input/input20</code></p><p><code>[82711.615135] hid-generic 0003:04E6:5A11.0005: input,hidraw2: USB HID v1.11 Keyboard [Identiv uTrust FIDO2 Security Key] on usb-0000:00:14.0-4/input2</code></p><p><strong>Linux &#8220;lsusb&#8221;:</strong></p><p><code>Bus 001 Device 007: ID 04e6:5a11 SCM Microsystems, Inc. uTrust FIDO2 Security Key</code></p><h4>Experience: </h4><p>This key is the cheapest, and it shows. The button used to prove that the operator of the key is present is set pretty low within the key's housing. This sometimes makes it tricky to &#8220;touch,&#8221; unlike other keys. Physically, it feels cheap, and I don&#8217;t think it would hold up to wear and tear.</p><p>This was also the most frustrating key to use. Every key covered in this list would let me set the key&#8217;s PIN upon first use, but this one did not. This means you must load the Windows-only software to set the PIN, which must be set to register Passkeys.</p><p>The &#8220;technical&#8221; specs didn&#8217;t indicate how many FIDO2 credentials it can hold. Some technical specifications might tell you how much memory the key has, which can help you estimate how many FIDO2 keys the device might hold.</p><p>Not only that,  but locating the correct software was also a challenge.  When going to the identiv.com website,   I got this: </p><p><em>&#8220;On September 6, 2024, Identiv completed the sale of its physical security, access card, and identity reader operations and assets. Identiv is now solely focused on developing, manufacturing, and supplying its specialty Internet of Things (IoT) solutions and in-house IoT connecting cloud.&#8221;</em></p><p>After more research,  I discovered that identiv.com was sold to <a href="https://www.hirschsecure.com/">https://www.hirschsecure.com/</a>. </p><p>I broke down and loaded the &#8220;uTrust Key Manager&#8221; software, which allowed me to set the initial PIN. After setting the PIN, I retested it with Google Chrome, but that still didn&#8217;t work.  </p><p>After the initial setup, the key was functional with macOS and Linux. However, I found it frustrating to use. I tested it with Key9, the identity company where I work, and on <a href="https://webauthn.io">https://webauthn.io</a>. </p><p>The key was unreliable; it sometimes needed to be &#8220;reinserted&#8221; before it would work. On macOS, I experienced multiple instances of the web browser freezing. When it did work, it prompted me to &#8220;select&#8221; the key to use, even though there was only one passkey associated with the site.</p><p>The key did not support SSH.   Overall,  this key was frustrating and cannot be recommended.</p><p>This key is manufactured in the USA.</p><div><hr></div><h2>HyperFIDO Titanium PRO FIDO2 Security Key</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!F8Zh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef3f06d-0517-4246-ba2b-2ae370a58702_987x1268.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!F8Zh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef3f06d-0517-4246-ba2b-2ae370a58702_987x1268.png 424w, https://substackcdn.com/image/fetch/$s_!F8Zh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef3f06d-0517-4246-ba2b-2ae370a58702_987x1268.png 848w, https://substackcdn.com/image/fetch/$s_!F8Zh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef3f06d-0517-4246-ba2b-2ae370a58702_987x1268.png 1272w, https://substackcdn.com/image/fetch/$s_!F8Zh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef3f06d-0517-4246-ba2b-2ae370a58702_987x1268.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!F8Zh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef3f06d-0517-4246-ba2b-2ae370a58702_987x1268.png" width="421" height="540.8591691995947" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/def3f06d-0517-4246-ba2b-2ae370a58702_987x1268.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1268,&quot;width&quot;:987,&quot;resizeWidth&quot;:421,&quot;bytes&quot;:2172415,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef3f06d-0517-4246-ba2b-2ae370a58702_987x1268.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!F8Zh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef3f06d-0517-4246-ba2b-2ae370a58702_987x1268.png 424w, https://substackcdn.com/image/fetch/$s_!F8Zh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef3f06d-0517-4246-ba2b-2ae370a58702_987x1268.png 848w, https://substackcdn.com/image/fetch/$s_!F8Zh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef3f06d-0517-4246-ba2b-2ae370a58702_987x1268.png 1272w, https://substackcdn.com/image/fetch/$s_!F8Zh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef3f06d-0517-4246-ba2b-2ae370a58702_987x1268.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4MVu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0a147f-c6c3-43e4-b2ba-6e9c0cca7d85_725x1014.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4MVu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0a147f-c6c3-43e4-b2ba-6e9c0cca7d85_725x1014.png 424w, https://substackcdn.com/image/fetch/$s_!4MVu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0a147f-c6c3-43e4-b2ba-6e9c0cca7d85_725x1014.png 848w, https://substackcdn.com/image/fetch/$s_!4MVu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0a147f-c6c3-43e4-b2ba-6e9c0cca7d85_725x1014.png 1272w, https://substackcdn.com/image/fetch/$s_!4MVu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0a147f-c6c3-43e4-b2ba-6e9c0cca7d85_725x1014.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4MVu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0a147f-c6c3-43e4-b2ba-6e9c0cca7d85_725x1014.png" width="421" height="588.8193103448276" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0f0a147f-c6c3-43e4-b2ba-6e9c0cca7d85_725x1014.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1014,&quot;width&quot;:725,&quot;resizeWidth&quot;:421,&quot;bytes&quot;:1494329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0a147f-c6c3-43e4-b2ba-6e9c0cca7d85_725x1014.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4MVu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0a147f-c6c3-43e4-b2ba-6e9c0cca7d85_725x1014.png 424w, https://substackcdn.com/image/fetch/$s_!4MVu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0a147f-c6c3-43e4-b2ba-6e9c0cca7d85_725x1014.png 848w, https://substackcdn.com/image/fetch/$s_!4MVu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0a147f-c6c3-43e4-b2ba-6e9c0cca7d85_725x1014.png 1272w, https://substackcdn.com/image/fetch/$s_!4MVu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0a147f-c6c3-43e4-b2ba-6e9c0cca7d85_725x1014.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mbW1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61ca4a0e-3516-4268-9846-1ff1bb18c69f_721x990.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mbW1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61ca4a0e-3516-4268-9846-1ff1bb18c69f_721x990.png 424w, https://substackcdn.com/image/fetch/$s_!mbW1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61ca4a0e-3516-4268-9846-1ff1bb18c69f_721x990.png 848w, https://substackcdn.com/image/fetch/$s_!mbW1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61ca4a0e-3516-4268-9846-1ff1bb18c69f_721x990.png 1272w, https://substackcdn.com/image/fetch/$s_!mbW1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61ca4a0e-3516-4268-9846-1ff1bb18c69f_721x990.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mbW1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61ca4a0e-3516-4268-9846-1ff1bb18c69f_721x990.png" width="421" height="578.0721220527046" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61ca4a0e-3516-4268-9846-1ff1bb18c69f_721x990.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:990,&quot;width&quot;:721,&quot;resizeWidth&quot;:421,&quot;bytes&quot;:1370117,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61ca4a0e-3516-4268-9846-1ff1bb18c69f_721x990.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mbW1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61ca4a0e-3516-4268-9846-1ff1bb18c69f_721x990.png 424w, https://substackcdn.com/image/fetch/$s_!mbW1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61ca4a0e-3516-4268-9846-1ff1bb18c69f_721x990.png 848w, https://substackcdn.com/image/fetch/$s_!mbW1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61ca4a0e-3516-4268-9846-1ff1bb18c69f_721x990.png 1272w, https://substackcdn.com/image/fetch/$s_!mbW1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61ca4a0e-3516-4268-9846-1ff1bb18c69f_721x990.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Brand:</strong> Hypersecu</p><p><strong>Link:</strong> <a href="https://www.amazon.com/dp/B07T7SPMJB">https://www.amazon.com/dp/B07T7SPMJB</a></p><p><strong>Price: </strong>$17.75</p><p><strong>Storage:</strong> unknown</p><p><strong>Support:</strong> FIDO U2F, FIDO2 (WebAuthn) and HOTP (HMAC-SHA1 one-time password) all-in-one device</p><p><strong>SSH Support:</strong> Supports ecdsa-sk, but does not support ed25519-sk</p><p><strong>Software/Manual:</strong> <a href="https://www.scbsolutions.com/Brochures/ProProgrammer.zip">https://www.scbsolutions.com/Brochures/ProProgrammer.zip</a> (has manual within zip)</p><p><strong>Pros:</strong> Nice, durable case. Would use as a daily driver. Great Price. Easy to access button.  Did not require 3rd party software to setup.</p><p>Cons: No NFC. </p><p><strong>Linux &#8220;dmesg&#8221;:</strong></p><p><code>[83870.034876] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=0</code></p><p><code>[83870.034883] usb 1-4: Product: HyperFIDO</code></p><p><code>[83870.034889] usb 1-4: Manufacturer: HS</code></p><p><code>[83870.054993] input: HS HyperFIDO as /devices/pci0000:00/0000:00:14.0/usb1/1-4/1-4:1.0/0003:2CCF:0854.0012/input/input27</code></p><p><code>[83870.132067] hid-generic 0003:2CCF:0854.0012: input,hidraw1: USB HID v1.00 Keyboard [HS HyperFIDO] on usb-0000:00:14.0-4/input0</code></p><p><code>[83870.142197] hid-generic 0003:2CCF:0854.0013: hiddev0,hidraw2: USB HID v1.10 Device [HS HyperFIDO] on usb-0000:00:14.0-4/input1</code></p><p><strong>Linux &#8220;lsusb&#8221;:</strong></p><p><code>Bus 001 Device 012: ID 2ccf:0854 Hypersecu HyperFIDO</code></p><h4>Experience: </h4><p>This key is quite impressive. It has a solid construction and a satisfying tactile feel to the button. Additionally, it is a good size. I'm uncertain if it would survive a trip through the washer and dryer, but the manufacturing quality is good overall.</p><p>Knowing the number of available Passkeys and SSH keys slots would be helpful.</p><p>Using the Chrome web browser, users can now update or delete passkeys and SSH keys from their devices, which is very convenient.</p><p>It would have been beneficial if it supported ed25519-sk for SSH, but ecdsa-sk is likely sufficient for most users. While it doesn&#8217;t have NFC, this is probably not a significant drawback for most people.  </p><p>This key offers good value for its price.</p><p>According to the documentation, this key is manufactured in China.  There are indications that Hypersecu may offer manufacturing in Canada for large enterprise orders.</p><div><hr></div><h2>Thetis Pro FIDO2 Security Key</h2><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bLwh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc9f96be-7872-462a-bb5d-27a330eb3284_696x943.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bLwh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc9f96be-7872-462a-bb5d-27a330eb3284_696x943.png 424w, https://substackcdn.com/image/fetch/$s_!bLwh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc9f96be-7872-462a-bb5d-27a330eb3284_696x943.png 848w, https://substackcdn.com/image/fetch/$s_!bLwh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc9f96be-7872-462a-bb5d-27a330eb3284_696x943.png 1272w, https://substackcdn.com/image/fetch/$s_!bLwh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc9f96be-7872-462a-bb5d-27a330eb3284_696x943.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bLwh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc9f96be-7872-462a-bb5d-27a330eb3284_696x943.png" width="420" height="569.051724137931" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cc9f96be-7872-462a-bb5d-27a330eb3284_696x943.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:943,&quot;width&quot;:696,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:816225,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc9f96be-7872-462a-bb5d-27a330eb3284_696x943.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bLwh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc9f96be-7872-462a-bb5d-27a330eb3284_696x943.png 424w, https://substackcdn.com/image/fetch/$s_!bLwh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc9f96be-7872-462a-bb5d-27a330eb3284_696x943.png 848w, https://substackcdn.com/image/fetch/$s_!bLwh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc9f96be-7872-462a-bb5d-27a330eb3284_696x943.png 1272w, https://substackcdn.com/image/fetch/$s_!bLwh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc9f96be-7872-462a-bb5d-27a330eb3284_696x943.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vUGS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f8c1e0f-2556-42c8-907d-a99a3a5b510e_742x710.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vUGS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f8c1e0f-2556-42c8-907d-a99a3a5b510e_742x710.png 424w, https://substackcdn.com/image/fetch/$s_!vUGS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f8c1e0f-2556-42c8-907d-a99a3a5b510e_742x710.png 848w, https://substackcdn.com/image/fetch/$s_!vUGS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f8c1e0f-2556-42c8-907d-a99a3a5b510e_742x710.png 1272w, https://substackcdn.com/image/fetch/$s_!vUGS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f8c1e0f-2556-42c8-907d-a99a3a5b510e_742x710.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vUGS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f8c1e0f-2556-42c8-907d-a99a3a5b510e_742x710.png" width="420" height="401.8867924528302" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0f8c1e0f-2556-42c8-907d-a99a3a5b510e_742x710.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:710,&quot;width&quot;:742,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:1237939,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f8c1e0f-2556-42c8-907d-a99a3a5b510e_742x710.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vUGS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f8c1e0f-2556-42c8-907d-a99a3a5b510e_742x710.png 424w, https://substackcdn.com/image/fetch/$s_!vUGS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f8c1e0f-2556-42c8-907d-a99a3a5b510e_742x710.png 848w, https://substackcdn.com/image/fetch/$s_!vUGS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f8c1e0f-2556-42c8-907d-a99a3a5b510e_742x710.png 1272w, https://substackcdn.com/image/fetch/$s_!vUGS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f8c1e0f-2556-42c8-907d-a99a3a5b510e_742x710.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Brand:</strong>  Thetis</p><p><strong>Link:</strong> <a href="https://www.amazon.com/dp/B0BJP64YTT">https://www.amazon.com/dp/B0BJP64YTT</a></p><p><strong>Price:</strong> $32.95</p><p><strong>Storage:</strong>  50 Passkeys/SSH keys.</p><p><strong>Support:</strong> FIDO2, FIDO U2F &amp; TOTP/HOTP</p><p><strong>SSH Support:</strong> Supports ecdsa-sk and ed25519-sk</p><p><strong>Software/Manual:</strong> <a href="https://thetis.io/pages/downloads">https://thetis.io/pages/downloads</a></p><p><strong>Pros: </strong> It has functional NFC.  Didn&#8217;t need third-party software to set up. By default,  it enforces a 6-character PIN.  I like the USB-A &#8594; USB-C &#8220;swivel&#8221; design.  Comes with a nice little carrying case. </p><p><strong>Cons:</strong>  Bulky due to its USB-A / USB-C design</p><p><strong>Linux &#8220;dmesg&#8221;: </strong></p><p><code>[86328.338933] usb 1-4: new full-speed USB device number 13 using xhci_hcd</code></p><p><code>[86328.468226] usb 1-4: New USB device found, idVendor=1ea8, idProduct=f825, bcdDevice= 1.00</code></p><p><code>[86328.468249] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=0</code></p><p><code>[86328.468256] usb 1-4: Product: Security Key(F825)</code></p><p><code>[86328.468262] usb 1-4: Manufacturer: Thetis</code></p><p><code>[86328.475356] hid-generic 0003:1EA8:F825.0014: hiddev0,hidraw1: USB HID v1.10 Device [Thetis Security Key(F825)] on usb-0000:00:14.0-4/input0</code></p><p><strong>Linux &#8220;lsusb&#8221;:</strong></p><p><code>Bus 001 Device 013: ID 1ea8:f825 Thetis Security Key(F825)</code></p><h4>Experience:</h4><p>Although the price range may increase, this key feature is a unique design. It&#8217;s likely quite useful for those who navigate USB-A, USB-C, and NFC&#8212;this single key supports all three!</p><p>The key has a &#8220;swivel&#8221; design, which means you can &#8220;switch&#8221; it between USB-A and USB-C. The presence button is in the center of the key and has a nice tactile feel. The manufacturing quality feels good, but I&#8217;m not sure it would survive a trip through the washer and dryer. </p><p>The key did not require loading the Thetis software, as it worked fine with Chrome.  I like that it requires a 6-digit key by default. In fact, it was the only key tested that required a 6-digit PIN by default. Using third-party software, most keys will allow you to change the default PIN length, but that requires loading bloatware and an extra step during implementation.</p><p>Another plus is that SSH keys stored on this device support ecdsa-sk and ed25519-sk.   That was a pleasant surprise. </p><p>I found NFC to be a bit tricky to use. For instance, I have an iPhone 16 Pro, and I sometimes struggled to find the right spot for the NFC to work effectively. When I removed my phone case, its performance improved. However, I noticed that some other keys tested seemed to work better with NFC, and I didn't need to remove my phone case for those.</p><p>My only complaint is that the key feels somewhat bulky, which is a result of its design. It's not excessively large, but when trying to incorporate USB-A, USB-C, and NFC into a single key, I don't see how this can be avoided.</p><p>If the slightly bulky design doesn't bother you, this key could be your daily driver.</p><p>According to the documentation, this key is manufactured in China.</p><div><hr></div><h2>Trustkey T120</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q_os!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48365fe4-62f4-4ffe-a86e-e5558325750d_757x1013.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q_os!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48365fe4-62f4-4ffe-a86e-e5558325750d_757x1013.png 424w, https://substackcdn.com/image/fetch/$s_!q_os!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48365fe4-62f4-4ffe-a86e-e5558325750d_757x1013.png 848w, https://substackcdn.com/image/fetch/$s_!q_os!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48365fe4-62f4-4ffe-a86e-e5558325750d_757x1013.png 1272w, https://substackcdn.com/image/fetch/$s_!q_os!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48365fe4-62f4-4ffe-a86e-e5558325750d_757x1013.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q_os!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48365fe4-62f4-4ffe-a86e-e5558325750d_757x1013.png" width="420" height="562.0343461030383" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/48365fe4-62f4-4ffe-a86e-e5558325750d_757x1013.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1013,&quot;width&quot;:757,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:1569086,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48365fe4-62f4-4ffe-a86e-e5558325750d_757x1013.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!q_os!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48365fe4-62f4-4ffe-a86e-e5558325750d_757x1013.png 424w, https://substackcdn.com/image/fetch/$s_!q_os!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48365fe4-62f4-4ffe-a86e-e5558325750d_757x1013.png 848w, https://substackcdn.com/image/fetch/$s_!q_os!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48365fe4-62f4-4ffe-a86e-e5558325750d_757x1013.png 1272w, https://substackcdn.com/image/fetch/$s_!q_os!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48365fe4-62f4-4ffe-a86e-e5558325750d_757x1013.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bcym!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9c79c27-51ba-4026-afc9-10528cfabaed_764x999.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bcym!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9c79c27-51ba-4026-afc9-10528cfabaed_764x999.png 424w, https://substackcdn.com/image/fetch/$s_!bcym!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9c79c27-51ba-4026-afc9-10528cfabaed_764x999.png 848w, https://substackcdn.com/image/fetch/$s_!bcym!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9c79c27-51ba-4026-afc9-10528cfabaed_764x999.png 1272w, https://substackcdn.com/image/fetch/$s_!bcym!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9c79c27-51ba-4026-afc9-10528cfabaed_764x999.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bcym!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9c79c27-51ba-4026-afc9-10528cfabaed_764x999.png" width="420" height="549.1884816753927" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9c79c27-51ba-4026-afc9-10528cfabaed_764x999.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:999,&quot;width&quot;:764,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:1037906,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9c79c27-51ba-4026-afc9-10528cfabaed_764x999.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bcym!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9c79c27-51ba-4026-afc9-10528cfabaed_764x999.png 424w, https://substackcdn.com/image/fetch/$s_!bcym!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9c79c27-51ba-4026-afc9-10528cfabaed_764x999.png 848w, https://substackcdn.com/image/fetch/$s_!bcym!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9c79c27-51ba-4026-afc9-10528cfabaed_764x999.png 1272w, https://substackcdn.com/image/fetch/$s_!bcym!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9c79c27-51ba-4026-afc9-10528cfabaed_764x999.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Brand:</strong> Trustkey</p><p><strong>Link:</strong> <a href="https://www.amazon.com/dp/B08881651P">https://www.amazon.com/dp/B08881651P</a></p><p><strong>Price:</strong> $20.00</p><p><strong>Storage:</strong> Some pages stated 150 slots, while others stated 200.</p><p><strong>Support:</strong> FIDO2, U2F, TOTP, HOTP</p><p><strong>SSH Support:</strong> Only supports ecdsa-sk.</p><p><strong>Software/Manual:</strong> <a href="https://www.trustkey.kr/en/sub/support.form">https://www.trustkey.kr/en/sub/support.form</a></p><p><strong>Pros:</strong> Great price point.  Users can store a sufficient number of keys. No third-party software is needed. </p><p><strong>Cons:</strong>  No NFC</p><p><strong>Linux &#8220;dmesg&#8221;:</strong></p><p><code>[166284.617164] usb 1-4: New USB device found, idVendor=311f, idProduct=a6e9, bcdDevice= 0.00</code></p><p><code>[166284.617188] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=3</code></p><p><code>[166284.617195] usb 1-4: Product: TrustKey T120</code></p><p><code>[166284.617201] usb 1-4: Manufacturer: TrustKey</code></p><p><code>[166284.617206] usb 1-4: SerialNumber: A00000000017</code></p><p><code>[166284.622626] hid-generic 0003:311F:A6E9.0015: hiddev0,hidraw1: USB HID v1.10 Device [TrustKey TrustKey T120] on usb-0000:00:14.0-4/input0</code></p><p><code>[166284.624382] input: TrustKey TrustKey T120 as /devices/pci0000:00/0000:00:14.0/usb1/1-4/1-4:1.1/0003:311F:A6E9.0016/input/input28</code></p><p><code>[166284.702150] hid-generic 0003:311F:A6E9.0016: input,hidraw2: USB HID v1.10 Keyboard [TrustKey TrustKey T120] on usb-0000:00:14.0-4/input1</code></p><p><strong>Linux &#8220;lsusb&#8221;:</strong></p><p><code>Bus 001 Device 014: ID 311f:a6e9 TrustKey TrustKey T120</code></p><h4>Experience:</h4><p>This key is quite good. Its size closely resembles a Yubikey, roughly the same as the Yubico 5C series key (USB-C). While it may not match the manufacturing quality of a Yubikey, it is still very close.</p><p>Considering its price point and memory capacity, it's a good deal, especially if you primarily plan to use it for storing Passkeys. However, if you intend to use the key to store SSH keys, remember that it only supports ecdsa-sk.</p><p>It lacks NFC, but at this price, that isn&#8217;t surprising, and many users may not mind.</p><p>At this price point, you can have one as a daily driver and purchase another key as a backup.</p><p>The key is manufactured in South Korea. </p><div><hr></div><h2>Thales Safenet eToken FIDO Type C</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Gh36!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8210287-a614-4124-89b6-f4f0021789b5_752x964.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Gh36!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8210287-a614-4124-89b6-f4f0021789b5_752x964.png 424w, https://substackcdn.com/image/fetch/$s_!Gh36!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8210287-a614-4124-89b6-f4f0021789b5_752x964.png 848w, https://substackcdn.com/image/fetch/$s_!Gh36!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8210287-a614-4124-89b6-f4f0021789b5_752x964.png 1272w, https://substackcdn.com/image/fetch/$s_!Gh36!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8210287-a614-4124-89b6-f4f0021789b5_752x964.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Gh36!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8210287-a614-4124-89b6-f4f0021789b5_752x964.png" width="420" height="538.4042553191489" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c8210287-a614-4124-89b6-f4f0021789b5_752x964.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:964,&quot;width&quot;:752,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:906808,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8210287-a614-4124-89b6-f4f0021789b5_752x964.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Gh36!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8210287-a614-4124-89b6-f4f0021789b5_752x964.png 424w, https://substackcdn.com/image/fetch/$s_!Gh36!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8210287-a614-4124-89b6-f4f0021789b5_752x964.png 848w, https://substackcdn.com/image/fetch/$s_!Gh36!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8210287-a614-4124-89b6-f4f0021789b5_752x964.png 1272w, https://substackcdn.com/image/fetch/$s_!Gh36!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8210287-a614-4124-89b6-f4f0021789b5_752x964.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ojsl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3dc70-570d-4703-89d4-aef45f0e16f1_637x788.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ojsl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3dc70-570d-4703-89d4-aef45f0e16f1_637x788.png 424w, https://substackcdn.com/image/fetch/$s_!ojsl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3dc70-570d-4703-89d4-aef45f0e16f1_637x788.png 848w, https://substackcdn.com/image/fetch/$s_!ojsl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3dc70-570d-4703-89d4-aef45f0e16f1_637x788.png 1272w, https://substackcdn.com/image/fetch/$s_!ojsl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3dc70-570d-4703-89d4-aef45f0e16f1_637x788.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ojsl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3dc70-570d-4703-89d4-aef45f0e16f1_637x788.png" width="421" height="520.7974882260596" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40c3dc70-570d-4703-89d4-aef45f0e16f1_637x788.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:788,&quot;width&quot;:637,&quot;resizeWidth&quot;:421,&quot;bytes&quot;:878320,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3dc70-570d-4703-89d4-aef45f0e16f1_637x788.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ojsl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3dc70-570d-4703-89d4-aef45f0e16f1_637x788.png 424w, https://substackcdn.com/image/fetch/$s_!ojsl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3dc70-570d-4703-89d4-aef45f0e16f1_637x788.png 848w, https://substackcdn.com/image/fetch/$s_!ojsl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3dc70-570d-4703-89d4-aef45f0e16f1_637x788.png 1272w, https://substackcdn.com/image/fetch/$s_!ojsl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3dc70-570d-4703-89d4-aef45f0e16f1_637x788.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Brand:</strong> Thales</p><p><strong>Link:</strong> <a href="https://www.amazon.com/dp/B0CVSH3FBG">https://www.amazon.com/dp/B0CVSH3FBG</a></p><p><strong>Price: </strong>$25.00</p><p><strong>Storage:</strong> Technical specifications stated &#8220;55 KB&#8221; and &#8220;up to 8 FIDO discoverable credentials (resident keys).  See <a href="https://cpl.thalesgroup.com/sites/default/files/content/brochures/FIDO2-security-keys-specifications-br.pdf">https://cpl.thalesgroup.com/sites/default/files/content/brochures/FIDO2-security-keys-specifications-br.pdf</a></p><p><strong>Support:</strong> FIDO, FIDO2. U2F</p><p><strong>Software/Manual:</strong>  <a href="https://cpl.thalesgroup.com/sites/default/files/content/brochures/FIDO2-security-keys-specifications-br.pdfetoken">https://cpl.thalesgroup.com/sites/default/files/content/brochures/FIDO2-security-keys-specifications-br.pdfetoken</a> [this is a great specification page]</p><p><a href="https://cpl.thalesgroup.com/access-management/authenticators/safenet-fido-key-manager">https://cpl.thalesgroup.com/access-management/authenticators/safenet-fido-key-manager</a></p><p><strong>SSH Support:</strong>  None</p><p><strong>Pros</strong>:  It has a very small form factor. There is no &#8220;button;&#8221;  you touch the metal on the key.  I liked this.  It's a good price point.</p><p><strong>Cons: </strong>&nbsp;It lacks a status LED and does not work with Chrome&#8217;s built-in security key management. It also lacks NFC and SSH support.</p><p><strong>Linux &#8220;dmesg&#8221;:</strong></p><p><code>[168221.693326] usb 1-4: New USB device found, idVendor=08e6, idProduct=34d1, bcdDevice= 0.08</code></p><p><code>[168221.693346] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=3</code></p><p><code>[168221.693351] usb 1-4: Product: eToken Fido</code></p><p><code>[168221.693355] usb 1-4: Manufacturer: SafeNet</code></p><p><code>[168221.693358] usb 1-4: SerialNumber: 02EDDEEDD3F9</code></p><p><code>[168221.698532] hid-generic 0003:08E6:34D1.0019: hiddev0,hidraw1: USB HID v1.11 Device [SafeNet eToken Fido] on usb-0000:00:14.0-4/input0</code></p><p><strong>Linux &#8220;lsusb&#8221;:</strong></p><p><code>Bus 001 Device 016: ID 08e6:34d1 Gemalto (was Gemplus) eToken Fido</code></p><h4>Experience:</h4><p>This key has a great,  super-small form factor and seems to be built very well. </p><p>However,  it&#8217;s not a great key.  </p><p>I was pleased that when I set up my first Passkey, the process allowed me to create a PIN directly within the browser. However, when I tried to manage the key&#8217;s "sign-in data&#8221; in Chrome,  I received an error message stating, &#8220;This security key can't store any sign-in data.&#8221; </p><p>This suggests that to remove Passkeys, you need to use Thales software.  </p><p>The key can only store about 8 Passkeys,  which isn&#8217;t enough for most users.  </p><p>This key is manufactured in China or Cambodia.</p><div><hr></div><h2>Google Titan Key</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nCgR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8f472e7-ea64-4b90-b8f6-a5af1b9b4452_1199x962.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nCgR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8f472e7-ea64-4b90-b8f6-a5af1b9b4452_1199x962.png 424w, https://substackcdn.com/image/fetch/$s_!nCgR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8f472e7-ea64-4b90-b8f6-a5af1b9b4452_1199x962.png 848w, https://substackcdn.com/image/fetch/$s_!nCgR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8f472e7-ea64-4b90-b8f6-a5af1b9b4452_1199x962.png 1272w, https://substackcdn.com/image/fetch/$s_!nCgR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8f472e7-ea64-4b90-b8f6-a5af1b9b4452_1199x962.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nCgR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8f472e7-ea64-4b90-b8f6-a5af1b9b4452_1199x962.png" width="420" height="336.9808173477898" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8f472e7-ea64-4b90-b8f6-a5af1b9b4452_1199x962.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:962,&quot;width&quot;:1199,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:844531,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8f472e7-ea64-4b90-b8f6-a5af1b9b4452_1199x962.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nCgR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8f472e7-ea64-4b90-b8f6-a5af1b9b4452_1199x962.png 424w, https://substackcdn.com/image/fetch/$s_!nCgR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8f472e7-ea64-4b90-b8f6-a5af1b9b4452_1199x962.png 848w, https://substackcdn.com/image/fetch/$s_!nCgR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8f472e7-ea64-4b90-b8f6-a5af1b9b4452_1199x962.png 1272w, https://substackcdn.com/image/fetch/$s_!nCgR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8f472e7-ea64-4b90-b8f6-a5af1b9b4452_1199x962.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fKJn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88173418-768f-43da-9f2d-bed816d3597d_623x968.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fKJn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88173418-768f-43da-9f2d-bed816d3597d_623x968.png 424w, https://substackcdn.com/image/fetch/$s_!fKJn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88173418-768f-43da-9f2d-bed816d3597d_623x968.png 848w, https://substackcdn.com/image/fetch/$s_!fKJn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88173418-768f-43da-9f2d-bed816d3597d_623x968.png 1272w, https://substackcdn.com/image/fetch/$s_!fKJn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88173418-768f-43da-9f2d-bed816d3597d_623x968.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fKJn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88173418-768f-43da-9f2d-bed816d3597d_623x968.png" width="421" height="654.1380417335473" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/88173418-768f-43da-9f2d-bed816d3597d_623x968.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:968,&quot;width&quot;:623,&quot;resizeWidth&quot;:421,&quot;bytes&quot;:1088702,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88173418-768f-43da-9f2d-bed816d3597d_623x968.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fKJn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88173418-768f-43da-9f2d-bed816d3597d_623x968.png 424w, https://substackcdn.com/image/fetch/$s_!fKJn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88173418-768f-43da-9f2d-bed816d3597d_623x968.png 848w, https://substackcdn.com/image/fetch/$s_!fKJn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88173418-768f-43da-9f2d-bed816d3597d_623x968.png 1272w, https://substackcdn.com/image/fetch/$s_!fKJn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88173418-768f-43da-9f2d-bed816d3597d_623x968.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Brand:</strong> Google</p><p><strong>Link:</strong>  https://store.google.com/us/product/titan_security_key</p><p><strong>Price:</strong> $35.00 USB-C, $30.00 for USB-A</p><p><strong>Storage:</strong> 250 unique Passkeys</p><p><strong>Support:</strong> FIDO2</p><p><strong>Software/Manual:</strong> https://support.google.com/titansecuritykey/</p><p><strong>SSH Support:</strong> Supports only ecdsa-sk. </p><p><strong>Pros:</strong> NFC.  Lots of memory for keys. Very well made from a known brand. </p><p><strong>Cons:</strong> <em>It  does NOT support built-in Chrome security key management tools</em>.  The price is at the higher range for a &#8220;cheap&#8221; key.</p><p><strong>Linux &#8220;dmesg&#8221;: </strong></p><p><code>[ 1033.914450] usb 1-4: New USB device found, idVendor=18d1, idProduct=9470, bcdDevice= 0.01</code></p><p><code>[ 1033.914472] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=3</code></p><p><code>[ 1033.914479] usb 1-4: Product: Titan Security Key v2</code></p><p><code>[ 1033.914484] usb 1-4: Manufacturer: Google</code></p><p><code>[ 1033.914489] usb 1-4: SerialNumber: 2</code></p><p><code>[ 1033.920835] hid-generic 0003:18D1:9470.0004: hiddev0,hidraw1: USB HID v1.11 Device [Google Titan Security Key v2] on usb-0000:00:14.0-4/input0</code></p><p><strong>Linux &#8220;lsusb&#8221;:</strong></p><p><code>Bus 001 Device 006: ID 18d1:9470 Google Inc. Titan Security Key v2</code></p><h4>Experience:</h4><p>This key is very nice, but I find it hard to recommend. The reason might surprise you&#8212; it certainly surprised me! </p><p>I can&#8217;t believe I have to write this, but this key does not support the built-in &#8220;Manage Security Keys&#8221; options in Google Chrome! Yes, you read that correctly&#8212;a key manufactured by Google cannot use the Chrome security key management tools.</p><p>You might think, &#8220;No big deal. I&#8217;ll install the software with the key to manage the sign-in data.&#8221; However, there is no software available for this purpose! Although the key has plenty of memory to store Passkeys, there is currently no way to remove old Passkeys. The only option that works in Chrome is the &#8220;Change the PIN&#8221; feature. </p><p>The key does support ecdsa-sk for SSH but not ed25519-sk. While testing the key, it dawned on me that it is a couple of years old. Maybe a newer key would have newer firmware, which might support ed25519-sk and Google Chrome&#8217;s built-in security key management.</p><p>After Googling around,  it seemed promising.   I found a user who stated that newer Google Titan keys supported ed25519-sk.   With this in mind,  I purchased a brand new Google Titan key.</p><p>The results remain unchanged: there is still no ed25519-sk for SSH support, and the key cannot be managed via Google Chrome. Various Reddit posts say this has been a known issue for over a year.</p><p>These issues were quite frustrating for a well-made key with excellent storage capacity!</p><p>The Google Titan key is made in China by Feitan. </p><div><hr></div><h2>Yubico - Security Key C NFC</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WexW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe96236ab-abec-4a64-90b7-e73651ad3fdd_415x520.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WexW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe96236ab-abec-4a64-90b7-e73651ad3fdd_415x520.png 424w, https://substackcdn.com/image/fetch/$s_!WexW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe96236ab-abec-4a64-90b7-e73651ad3fdd_415x520.png 848w, https://substackcdn.com/image/fetch/$s_!WexW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe96236ab-abec-4a64-90b7-e73651ad3fdd_415x520.png 1272w, https://substackcdn.com/image/fetch/$s_!WexW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe96236ab-abec-4a64-90b7-e73651ad3fdd_415x520.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WexW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe96236ab-abec-4a64-90b7-e73651ad3fdd_415x520.png" width="421" height="527.5180722891566" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e96236ab-abec-4a64-90b7-e73651ad3fdd_415x520.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:520,&quot;width&quot;:415,&quot;resizeWidth&quot;:421,&quot;bytes&quot;:362031,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe96236ab-abec-4a64-90b7-e73651ad3fdd_415x520.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WexW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe96236ab-abec-4a64-90b7-e73651ad3fdd_415x520.png 424w, https://substackcdn.com/image/fetch/$s_!WexW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe96236ab-abec-4a64-90b7-e73651ad3fdd_415x520.png 848w, https://substackcdn.com/image/fetch/$s_!WexW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe96236ab-abec-4a64-90b7-e73651ad3fdd_415x520.png 1272w, https://substackcdn.com/image/fetch/$s_!WexW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe96236ab-abec-4a64-90b7-e73651ad3fdd_415x520.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2d2G!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9897b767-4265-4894-a67a-d7b20a986cd3_871x866.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2d2G!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9897b767-4265-4894-a67a-d7b20a986cd3_871x866.png 424w, https://substackcdn.com/image/fetch/$s_!2d2G!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9897b767-4265-4894-a67a-d7b20a986cd3_871x866.png 848w, https://substackcdn.com/image/fetch/$s_!2d2G!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9897b767-4265-4894-a67a-d7b20a986cd3_871x866.png 1272w, https://substackcdn.com/image/fetch/$s_!2d2G!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9897b767-4265-4894-a67a-d7b20a986cd3_871x866.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2d2G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9897b767-4265-4894-a67a-d7b20a986cd3_871x866.png" width="420" height="417.5889781859931" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9897b767-4265-4894-a67a-d7b20a986cd3_871x866.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:866,&quot;width&quot;:871,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:1344655,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9897b767-4265-4894-a67a-d7b20a986cd3_871x866.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2d2G!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9897b767-4265-4894-a67a-d7b20a986cd3_871x866.png 424w, https://substackcdn.com/image/fetch/$s_!2d2G!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9897b767-4265-4894-a67a-d7b20a986cd3_871x866.png 848w, https://substackcdn.com/image/fetch/$s_!2d2G!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9897b767-4265-4894-a67a-d7b20a986cd3_871x866.png 1272w, https://substackcdn.com/image/fetch/$s_!2d2G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9897b767-4265-4894-a67a-d7b20a986cd3_871x866.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Brand:</strong> Yubico</p><p><strong>Link:</strong> <a href="https://www.amazon.com/dp/B0BVNRXFHT">https://www.amazon.com/dp/B0BVNRXFHT</a></p><p><strong>Price:</strong> $29.00</p><p><strong>Storage:</strong> 100 keys</p><p><strong>Support:</strong> FIDO2, U2F</p><p><strong>Software/Manual: </strong><a href="https://www.yubico.com/support/download/yubikey-manager/">https://www.yubico.com/support/download/yubikey-manager/</a></p><p><strong>SSH Support:</strong> ed25519-sk and ecdsa-sk </p><p><strong>Pros:</strong>  It's rugged, IP68 Water resistant, and crush resistant. It's at a good price point. It supports NFC. Yubikey makes more expensive keys, but this one does everything I need.</p><p><strong>Cons:</strong> None</p><p><strong>Linux &#8220;dmesg&#8221;:</strong></p><p><code>[  520.938599] usb 1-4: new full-speed USB device number 4 using xhci_hcd</code></p><p><code>[  521.067638] usb 1-4: New USB device found, idVendor=1050, idProduct=0402, bcdDevice= 5.71</code></p><p><code>[  521.067660] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=0</code></p><p><code>[  521.067667] usb 1-4: Product: YubiKey FIDO</code></p><p><code>[  521.067673] usb 1-4: Manufacturer: Yubico</code></p><p><code>[  521.131719] hid-generic 0003:1050:0402.0002: hiddev0,hidraw1: USB HID v1.10 Device [Yubico YubiKey FIDO] on usb-0000:00:14.0-4/input0</code></p><p><code>[  521.131810] usbcore: registered new interface driver usbhid</code></p><p><code>[  521.131814] usbhid: USB HID core driver</code></p><p><strong>Linux &#8220;lsusb&#8221;:</strong></p><p><strong>Bus 001 Device 004: ID 1050:0402 Yubico.com Yubikey 4/5 U2F</strong></p><h4>Experience:</h4><p>YubiKeys are among the most recognized hardware security keys in the industry.</p><p>These keys are a solid choice. However, it's important to note that they offer various options at varying prices. I outlined my specific goals at the beginning of this article: Support for Passkeys is essential, while SSH support is a bonus. Additionally, it's great that these keys support NFC, which has performed well in my testing.</p><p>While it doesn't hold the highest number of keys, 100 slots are sufficient for most users.</p><p>The advantage of this key is that it meets all my requirements. Specifically, I am referring to the &#8220;Yubico Security Key C NFC,&#8221; priced at $29.00. While Yubico, the manufacturer of YubiKeys, offers other models with additional features starting at around $50.00, those extra features are unnecessary for my needs.. </p><p>YubiKeys have an excellent reputation and are widely considered the industry standard for security keys. These devices are durable; several have survived multiple trips through the washer and dryer. They are IP68 water-resistant and crush-resistant, making them quite rugged.</p><p>The keys can be easily managed through the Chrome browser's built-in security settings. You do not need to install Yubico software unless you want to explore its features.</p><p>These keys are manufactured in Sweden and the USA. </p><div><hr></div><h2><strong>Cryptnox FIDO2 Smart Card</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g7fl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b011436-a737-4dd6-a4ad-4650f7c2223f_944x1189.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g7fl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b011436-a737-4dd6-a4ad-4650f7c2223f_944x1189.png 424w, https://substackcdn.com/image/fetch/$s_!g7fl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b011436-a737-4dd6-a4ad-4650f7c2223f_944x1189.png 848w, https://substackcdn.com/image/fetch/$s_!g7fl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b011436-a737-4dd6-a4ad-4650f7c2223f_944x1189.png 1272w, https://substackcdn.com/image/fetch/$s_!g7fl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b011436-a737-4dd6-a4ad-4650f7c2223f_944x1189.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g7fl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b011436-a737-4dd6-a4ad-4650f7c2223f_944x1189.png" width="420" height="529.0042372881356" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b011436-a737-4dd6-a4ad-4650f7c2223f_944x1189.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1189,&quot;width&quot;:944,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:2245863,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b011436-a737-4dd6-a4ad-4650f7c2223f_944x1189.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g7fl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b011436-a737-4dd6-a4ad-4650f7c2223f_944x1189.png 424w, https://substackcdn.com/image/fetch/$s_!g7fl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b011436-a737-4dd6-a4ad-4650f7c2223f_944x1189.png 848w, https://substackcdn.com/image/fetch/$s_!g7fl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b011436-a737-4dd6-a4ad-4650f7c2223f_944x1189.png 1272w, https://substackcdn.com/image/fetch/$s_!g7fl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b011436-a737-4dd6-a4ad-4650f7c2223f_944x1189.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x6nU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff326c-7a05-4ce5-9930-310ebd0c3180_764x996.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x6nU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff326c-7a05-4ce5-9930-310ebd0c3180_764x996.png 424w, https://substackcdn.com/image/fetch/$s_!x6nU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff326c-7a05-4ce5-9930-310ebd0c3180_764x996.png 848w, https://substackcdn.com/image/fetch/$s_!x6nU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff326c-7a05-4ce5-9930-310ebd0c3180_764x996.png 1272w, https://substackcdn.com/image/fetch/$s_!x6nU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff326c-7a05-4ce5-9930-310ebd0c3180_764x996.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x6nU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff326c-7a05-4ce5-9930-310ebd0c3180_764x996.png" width="421" height="548.8429319371728" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/48ff326c-7a05-4ce5-9930-310ebd0c3180_764x996.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:996,&quot;width&quot;:764,&quot;resizeWidth&quot;:421,&quot;bytes&quot;:1180127,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.k9.io/i/158345599?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff326c-7a05-4ce5-9930-310ebd0c3180_764x996.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!x6nU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff326c-7a05-4ce5-9930-310ebd0c3180_764x996.png 424w, https://substackcdn.com/image/fetch/$s_!x6nU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff326c-7a05-4ce5-9930-310ebd0c3180_764x996.png 848w, https://substackcdn.com/image/fetch/$s_!x6nU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff326c-7a05-4ce5-9930-310ebd0c3180_764x996.png 1272w, https://substackcdn.com/image/fetch/$s_!x6nU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff326c-7a05-4ce5-9930-310ebd0c3180_764x996.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Brand:</strong> Cryptnox</p><p><strong>Link:</strong> <a href="https://www.amazon.com/Cryptnox-Security-Physical-Second-Factor/dp/B0B384JCP8">https://www.amazon.com/Cryptnox-Security-Physical-Second-Factor/dp/B0B384JCP8</a></p><p><strong>Price:</strong> $31.74</p><p><strong>Storage:</strong> 4k, but it doesn&#8217;t explain how memory is allocated.</p><p><strong>Support:</strong>  FIDO2 (Passkeys), U2F</p><p>Software/Manual: <a href="https://cryptnox.com/directory/content/uploads/2024/10/Cryptnox-Fido2-Manual-and-Specifications-full.pdf">https://cryptnox.com/directory/content/uploads/2024/10/Cryptnox-Fido2-Manual-and-Specifications-full.pdf</a></p><p><strong>SSH Support:</strong> None</p><p><strong>Pros:&nbsp;</strong>It's&nbsp;Nice to have a key that can go in my wallet.   NFC worked well.</p><p><strong>Cons:</strong>&nbsp;It claims to be &#8220;Linux&#8221; compatible, but it isn&#8217;t. There is no SSH support. </p><p><strong>Linux &#8220;dmesg&#8221;:</strong></p><p><code>[ 2076.447982] Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7</code></p><p><code>[ 2563.074602] usb 1-4: new full-speed USB device number 8 using xhci_hcd</code></p><p><code>[ 2563.214111] usb 1-4: New USB device found, idVendor=058f, idProduct=9540, bcdDevice= 1.20</code></p><p><code>[ 2563.214133] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=0</code></p><p><code>[ 2563.214140] usb 1-4: Product: EMV Smartcard Reader</code></p><p><code>[ 2563.214145] usb 1-4: Manufacturer: Generic</code></p><p><strong>Linux &#8220;lsusb&#8221;:</strong></p><p><code>Bus 001 Device 008: ID 058f:9540 Alcor Micro Corp. AU9540 Smartcard Reader</code></p><h4>Experience:</h4><p>This isn&#8217;t a &#8220;key," but I wanted to try it out. There&#8217;s an entire market for these types of cards. Perhaps one day, I&#8217;ll do a &#8220;shootout&#8221; of those. </p><p>My primary motivation for testing this card was to determine if it could replace a hardware security key (i.e., one that you would typically carry on a key ring) that fits in your wallet. </p><p>Some jobs prohibit employees from bringing cell phones or USB devices. In these cases, a credit card-sized key that fits in a wallet may be utilized.</p><p>I must admit,  there is something nice about having your Passkeys securely stored in your wallet and not dangling off a key ring.   </p><p>There are some issues with going this route. </p><p>While NFC works well, if your laptop doesn't support NFC, you'll need to carry a reader for the card. Although the reader isn't bulky, it's an additional item to have and may eventually be lost.</p><p>The card and reader do not work with the built-in key management tools in the Chrome browser. You must use the Windows 11 key management software to set the initial PIN. Despite compatibility claims with both systems, it cannot be set up on macOS or Linux.  </p><p>After the PIN is set up, you might be able to use it with Linux/MacOS, but I never got it to work correctly. Since there is no &#8220;setup software," there&#8217;s no way to &#8220;manage&#8221; the keys stored on the device. The documentation states that the card has 4k storage but doesn&#8217;t indicate how much is reserved for Passkeys. I managed to store a few without issue, but I suspect you won&#8217;t be able to store many more.</p><h2>Final Thoughts:</h2><p>As suspected, the Yubikey Security Key C NFC ($29.00) is likely the best option for storing Passkeys and SSH keys, which isn&#8217;t surprising. However, a few budget-friendly hardware keys may not be as impressive as the Yubikey tested here, but they come close. </p><p>The Trustkey T120 ($20.00) is a solid choice for organizations operating on a limited budget. The Thetis Pro FIDO2 Security Key ($32.95) is also an attractive option for technically inclined people.</p><p>For personal use, pairing a Yubikey Security Key C NFC ($29.00) with the Trustkey backup ($20.00) seems like a good combination.</p><p>Thank you for reading this article. I hope you enjoyed it. It took a lot of effort, but it was fun to research and write. If your organization is looking for a path to becoming 100% &#8220;passwordless,&#8221;  please check out Key9 Identity ( <a href="https://k9.io">https://k9.io</a> ). </p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Passwords must die....]]></title><description><![CDATA[.... so Passkeys can live.]]></description><link>https://blog.k9.io/p/passwords-must-die</link><guid isPermaLink="false">https://blog.k9.io/p/passwords-must-die</guid><dc:creator><![CDATA[Champ Clark III]]></dc:creator><pubDate>Thu, 01 Aug 2024 20:22:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa19ac172-dda2-4f0a-bd71-0e9da25f95c4_258x258.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There has been recent press coverage on "<a href="https://www.darkreading.com/cloud-security/passkey-redaction-attacks-subvert-github-microsoft-authentication">Passkey Redaction Attacks</a>" by Joe Stewart. It's an informative piece about how Attackers in the Middle (AitM) can manipulate the "login" screen to remove the option of using a Passkey.&nbsp; </p><p>If the website offers a "backup" method of authentication, such as a secondary username and password, the user must use it.&nbsp; The attacker can capture the username and password, but not the Passkey. The attack is simple: force the victim to take the least secure route and compromise their account that way.</p><p>At Key9, we have acknowledged that outdated authentication protocols pose a risk to passkeys.&nbsp;&nbsp;</p><p>Imagine a scenario where a highly secure bank vault is protected by an off-the-shelf Walmart bike lock as a backup. The attacker will focus on attacking the Walmart bike lock instead of the expensive, highly secure locking mechanism.&nbsp; It may be a "convenient backup" for the user, but it is a vulnerability to the entire system.</p><p>Joe Stewart&#8217;s work is an excellent example of how such attacks might unfold. However, the attacker needs to be "in the middle" of the session, making it challenging to execute against TLS sessions at scale.</p><p>We have envisioned a more direct approach that aligns with a traditional phishing campaign. </p><p>In this method, the attacker would register a domain name that is similar to the target domain. This can be achieved through standard domain squatting, omission, or replacement techniques. For instance, the attacker might create a domain name like "examples.com" to imitate "example.com." This slight alteration makes the domain appear legitimate at a casual glance. </p><p>Attackers have been using this technique for years.</p><p>The attacker's domain directs users to a fraudulent "login" page that is an exact replica of the target's actual login page. The main distinction is that when the user tries to use their Passkey, the attacker's website shows a bogus "error message" claiming that Passkeys are not available and that the user should instead use the less secure traditional username and password.</p><p>By compelling the user to take a less secure path with usernames and passwords, attackers can employ their typical phishing tactics.</p><p>The reason we avoid using legacy authentication protocols, such as usernames and passwords, is precisely because of these types of attacks. Key9 does not depend on weaker forms of authentication; instead, we solely rely on public key cryptography (Passkeys). </p><p>This makes our platform immune to these kinds of attacks.</p><p>It will take time and trust building, but continued reliance on passwords will become increasingly vulnerable. Passkeys and public key cryptography can only work if we abandon legacy weak authentication protocols.</p>]]></content:encoded></item><item><title><![CDATA[The future is going to be passwordless....]]></title><description><![CDATA[.... but not for the reasons you might expect]]></description><link>https://blog.k9.io/p/the-future-is-going-to-be-passwordless</link><guid isPermaLink="false">https://blog.k9.io/p/the-future-is-going-to-be-passwordless</guid><dc:creator><![CDATA[Champ Clark III]]></dc:creator><pubDate>Tue, 23 Jul 2024 04:19:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facb7b144-4017-472e-909a-a719b9865146_144x144.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Lately, you may have come across the concept of passwordless systems, such as "Passkeys". From the user's perspective, this approach offers convenient and fast login experiences. Users no longer need to deal with multifactor authentication separately as it is integrated into the process. They also no longer need to search for their password in a password manager or, even worse, try to remember it. Overall, it provides a great user experience.</p><p>Companies will love this technology because it increases productivity. There's no longer a need for 'password resets,' which are estimated to waste 11 hours per year per employee. Additionally, 20% to 50% of IT staff time is currently wasted on 'password reset' calls. This is due to the fact that 78% of users forget their passwords within 90 days."</p><p>The more productive an employee can be without being distracted by password resets, invalid login attempts, and password updates, the more they can accomplish.</p><p>It can also protect companies from potential cyber-attacks, as 81% of all cyber-attacks are centered around stolen credentials.&nbsp;</p><p>The reasons mentioned are compelling enough to warrant considering a transition to passwordless technology.</p><p>There is yet another reason why many of the world's largest companies are embracing the "Passwordless" approach.&nbsp;</p><p>The reason is corporate liability.&nbsp;</p><p>Storing passwords carries significant risks. Many organizations struggle to do it securely, and in the event of a breach, they may face legal consequences.&nbsp; Around 73% of users admit to commonly "reusing passwords." This increases the potential impact or &#8220;blast radius&#8221; of password exposure during a breach. For example, if your organization's password database is breached, that data will be used in attacks known as &#8220;credential stuffing&#8221; to attack other organizations.</p><p>Simply put, a breach of your organization's passwords will likely be used to compromise other organizations. When people start examining the &#8220;root cause&#8221; of an incident, the roads might lead right back to you.</p><p>You might have already noticed a shift but not given it much thought. For instance, some websites are replacing usernames and passwords with "one-time codes" sent to your email. &nbsp; This is to avoid the responsibility and liability of having to store passwords.&nbsp;</p><p>These email links and one-time codes shift the security and liability to your email provider. In fact, Gmail.com is likely to do a better job of securing your account than the company you work for.</p><p>Public key cryptography allows you to log in without your company or identity provider (IdP) storing &#8220;secrets&#8221;. This is also why Passkeys are growing in popularity.&nbsp; &nbsp; Organizations that adopt this approach no longer risk exposing "secrets" such as passwords because they no longer have them. If an attacker were to compromise your company's "Passkey" database, they would only find public keys, which are useless without the corresponding private keys.&nbsp;&nbsp;</p><p>This mitigates the company's legal liabilities, ensuring that even if compromised, there is nothing for the attacker to &#8220;steal&#8221;.</p><p>This is why we say Key9 &#8220;doesn&#8217;t keep secrets&#8221;.&nbsp;</p>]]></content:encoded></item><item><title><![CDATA[Key9: We don't keep secrets.]]></title><description><![CDATA[We are proud to present the world's first fully Passkey-powered, zero-trust, cloud-based Identity Provider (iDp).]]></description><link>https://blog.k9.io/p/key9-we-dont-keep-secrets</link><guid isPermaLink="false">https://blog.k9.io/p/key9-we-dont-keep-secrets</guid><dc:creator><![CDATA[Champ Clark III]]></dc:creator><pubDate>Tue, 07 May 2024 19:07:39 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/249f049c-071c-4210-9fa1-6823f9867729_4000x2800.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p>We are proud to present the world's first fully Passkey-powered, zero-trust, cloud-based Identity Provider (iDp). Our state-of-the-art technology guarantees your online protection, so you can enjoy a secure and hassle-free experience.</p><p>Our business model has two main components. Firstly, we utilize open standards such as FIDO2 and Passkeys to eliminate the need for usernames and passwords. Secondly, we believe that Identity and Access Management (IAM) has become too complicated for many organizations. Our goal is to implement passwordless technologies and simplify identity management.</p><p>As you may already know, traditional usernames and passwords have been vulnerable for quite some time and can easily be compromised. Shockingly, over 80% of all security breaches occur as a result of weak, reused or compromised passwords. In fact, a quarter of the S&amp;P 500 had their SSO (single sign-on) credentials exposed and sold on the "dark web".</p><p>Multi-Factor Authentication (MFA) was created as a solution to prevent data breaches. However, while MFA has been effective in enhancing security, it has also made logging into applications more complicated and frustrating for users. This has resulted in what experts call "MFA Fatigue", which attackers can exploit by taking advantage of the users' frustration and confusion.</p><p>Although MFA has helped prevent breaches to a certain extent, many organizations have still been breached by attackers using a technique called "MFA bombing". In the early days of MFA, text messages (SMS) were used; however, security professionals have been urging people and organizations to switch to better alternatives like Time-Based One Time Passwords (TOTP). Nevertheless, many people still use SMS, which has made it easier for attackers to con telephony providers and perform SIM swapping attacks.</p><p>This is a problem faced by traditional and legacy Identity Providers (iDp). When these iDp&#8217;s rely solely on usernames and passwords, they may not feel the urgency to replace their business model. However, the consequences can be severe if a large number of companies had their Single Sign-On credentials exposed and sold on the "dark web". In such cases, traditional iDp may use "band-aid" solutions under the guise of "intelligence" by using terms like "impossible travel" and "threat intelligence". However, the root of the problem still remains.</p><p>Security breaches like those suffered by Okta highlight the importance of cybersecurity.</p><p>Many legacy IAM platforms that claim to support Passkeys often have other issues. One such problem is that these legacy platforms still rely on usernames and passwords as a backup means to access. This defeats the purpose of using public key cryptography and creates a vulnerability for attackers to bypass the added security provided by Passkeys.</p><p>Key9 avoids vendor lock-in and potential vulnerabilities by using open standards like "Passkeys" supported by major companies such as Microsoft, Google, Apple, and Mozilla instead of proprietary applications.</p><p>Key9 combined various technologies with SSO. The idea behind it is to use public key cryptography to eliminate the need for usernames and passwords. By doing so, we avoid storing sensitive information that could be vulnerable to hacking attempts. In other words, if we don't have your usernames and passwords, there is nothing for hackers to steal.</p><p>We still have a long journey ahead, but we hope you'll join us in a future without passwords.</p></blockquote>]]></content:encoded></item></channel></rss>