Android-Password-S
YubiKey-Guide
Our great sponsors
Android-Password-S | YubiKey-Guide | |
---|---|---|
9 | 112 | |
- | 10,714 | |
- | - | |
- | 7.9 | |
- | 7 days ago | |
HTML | ||
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Android-Password-S
-
Bitwarden: Free, open-source password manager
There is no "database", it's just a bunch of GPG encrypted files synced with git.
For Android there is https://github.com/android-password-store/Android-Password-S....
For Windows the only thing (Pass4Win) i found is unmaintained.
See https://www.passwordstore.org/#other
-
Joplin – open-source note-taking and to-do application with sync
These are the types of applications that I really love. It stores the data in a cloud service that already has enough free capacity for say a notes app. It's like how we can store pass(1) passwords on a git repository (Sync it with Github) and use that as the destination of Android Password Store[1], and you have a easy password manager.
[1] https://github.com/android-password-store/Android-Password-S...
-
Passwordless authentication with FIDO2–beyond just the web
Since I store most of my passwords using https://www.passwordstore.org/, I have used mobile with https://github.com/android-password-store/Android-Password-S.... I'm happy enough with it. Sucks for getting anything into consoles, for obvious reasons.
-
LastPass: Notice of Recent Security Incident
That's the exact setup I use on my main phone. There's also https://github.com/android-password-store/Android-Password-S..., which I use on throwaway phones.
-
Bitwarden Raises $100M
I moved to pass cli (on i3 with a simple rofi selector) and the FOSS android app https://github.com/android-password-store/Android-Password-S... synced over Syncthing and I never look back
-
GitJournal: Mobile first Markdown notes synchronized with Git
For encrypted secrets in git I'd suggest looking at sops and password store:
https://github.com/mozilla/sops
https://github.com/android-password-store/Android-Password-S...
Both are extremely useful secrets oriented git tools with support for things like PGP encryption. Both will encrypt with multiple keys too, making sharing relatively easy. The android pass app even manages SSH keys for pushing and pulling. There may be good inspiration in those repos, or even code you can borrow.
Also, thanks so much for making this: it is elegant and lovely. Keep it up!
-
Ask HN: Why should I trust password managers?
In addition, plasma-pass, qtpass, android password store (https://github.com/android-password-store/Android-Password-S...) are nice as well. Throw in a NFC Yubikey and OpenKeychain on android, then you can lock them with hardware keys. Since pass uses git, syncing can be done to a private repo on your home network or even just a cheap usb stick.
-
Clever uses of pass, the Unix password manager
Oh dammit. I have stopped using Gopass and started rewriting pass just for that reason - missing AGE encryption. At least I have learned something new and I feel better while my fuzzy finder UI instead of their TUI. However, big kudos to Gopass team for awesome work and really useful tool.
Before I start working on next project... Do you recognize any mobile app, which could replace PasswordStore.app for Android but with AGE support?
[0]: https://github.com/android-password-store/Android-Password-S...
-
Pass: The standard Unix password manager
I'm thinking about adding encrypted file support to my pass wrapper, p, but I've not really found a good argument to support breaking mobile apps (such as https://github.com/android-password-store/Android-Password-S...).
You'd have to manually look up the entries in a lookup table to resolve obfuscated names back to readable names... Or upstream support for whatever format is devised. I dunno.
YubiKey-Guide
-
Can I use Security Key C NFC as backup for 5C NFC if I use OpenPGP?
Instead, most people generate keypair(s) on an airgapped machine and write them to two Yubikeys. Or write subkeys to a single Yubikey and keep a backup in encrypted form. See https://github.com/drduh/YubiKey-Guide
-
Ask HN: Why does YubiCo need my private key?
I'd recommend using the Yubikey as a GPG smartcard[1]. The private key stays on the Yubikey. I also use it for ssh. But make sure you have a backup key or two, just in case the primary Yubikey gives out. FIDO2 and all other regular Yubikey functionality still works with it.
[1]: https://github.com/drduh/YubiKey-Guide
-
An Opinionated Yubikey Set-Up Guide
The excellent guide by drduh should be mentioned here: https://github.com/drduh/YubiKey-Guide — I've been using this approach for years to store my OpenPGP keys on Yubikeys and use them for SSH.
I don't generate my keys on devices. That lets me be flexible and keep backups, as well as use the same keys on multiple physical devices. Using a single yubikey is a bad idea, as you're bound to eventually lose it or break it. Hasn't happened to me yet in 5 years, but I expect it to happen.
-
How to use Yubikey to login into a server
I followed this guide to generate a master key and three subkey.
- Guide to Using Yubikey for GPG and SSH
-
GnuPG Private Key storage on YubiKey: Why are the private keys still present in my .gnupg/ folder?
See https://github.com/drduh/YubiKey-Guide . Also google for OpenPGP card specifications, they will answer your question
-
Got myself Yubikey and set it up for my password manager and email. What next?
Regarding GPG/SSH keys, there is a great howto: https://github.com/drduh/YubiKey-Guide
-
Some guidance from those who use their Yubikey to protect their SSH connections.
I'd be lying if I said I understood all of that. I'm definitely going to do some research ahaha. Someone else on this post sentence this like which they said was very good guide. https://github.com/drduh/YubiKey-Guide
-
When it comes to storing PGP keys what is the difference between a YubiKey and a standard USB key
When storing the key on a Yubikey, however, all you need is just the PIN in order to use the key. It can contain numbers, letters, symbols, etc. and can be quite long, so you can treat it as a passphrase for all intents and purposes. There are actually two PIN codes: one regular one, for a read access, and another administrative one, for write access for when you want to modify the gpg applet settings or the key on the Yubikey. There is also a limit to how many times in a row you can enter pins incorrectly, after which the gpg applet gets locked and the only thing you can do is reset it, erasing the PGP keys. See https://github.com/drduh/YubiKey-Guide for more information.
-
Issues moving OpenPGP encryption & authentication keys to YubiKey 5C
Try follow this guide from DrDuh https://github.com/drduh/YubiKey-Guide/blob/master/README.md
What are some alternatives?
gopass - The slightly more awesome standard unix password manager for teams
solo1 - Solo 1 firmware in C
pass-tomb - A pass extension that helps you keep the whole tree of passwords encrypted inside a Tomb.
wsl2-ssh-pageant - bridge between windows pageant and wsl2
pass-otp - A pass extension for managing one-time-password (OTP) tokens
sops - Simple and flexible tool for managing secrets
OkcAgent - A utility that makes OpenKeychain available in your Termux shell
wsl-ssh-pageant - A Pageant -> TCP bridge for use with WSL, allowing for Pageant to be used as an ssh-ageant within the WSL environment.
pass-coffin - A password store extension to hide data inside a signed and encrypted coffin
secretive - Store SSH keys in the Secure Enclave
passage - A fork of password-store (https://www.passwordstore.org) that uses age (https://age-encryption.org) as backend.
IsoApplet - A Java Card PKI Applet aiming to be ISO 7816 compliant