GlobalPlatformPro
solo1
GlobalPlatformPro | solo1 | |
---|---|---|
3 | 57 | |
644 | 2,278 | |
- | 0.8% | |
4.7 | 0.0 | |
7 days ago | over 1 year ago | |
Java | C | |
GNU Lesser General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
GlobalPlatformPro
- How do you put your private key files (.ppk) on a security key (HYPERFIDO U2F/FIDO2/HOTP) ?
-
Tillitis Security Key – Mullvad spin-off inspired by measured boot and DICE
JavaCard is the answer for smartcards. You can find example card software all over github, and you're looking for the JavaCard SDK from Oracle and GlobalPlatformPro to program them: https://github.com/martinpaljak/GlobalPlatformPro. There's even an ant task around somewhere that allows you to use ant tooling. Blank cards with "developer"/default keys can be picked up pretty much anywhere.
Buy blank cards, write your applet, test in an emulator if you want, push to card, test for real with your software that talks to the card, profit. Be aware that if your goal is to write custom cryptography implementations in Java on the Javacard, these will be prohibitively slow. No need to take my word for it, Niels Duif did exactly this: https://research.tue.nl/en/studentTheses/smart-card-implemen...
> Java Card proves to be a worthless platform for high-speed cryptography. Despite the
-
Using a smart card to log in
You then have to get the binary (CAP file) and use a tool like GlobalPlatformPro to install it. Hopefully your JavaCard has default authentication keys, otherwise you have to ask for this from whomever you bought it from.
solo1
-
Passkey Implementation: Misconceptions, pitfalls and unknown unknowns
All phones ask for PIN or pattern in addition to face/fingerprint. Use that.
For the average user this is safe enough. (i.e) keep google/apple password safe. Then all is fine.
> exporting and FAANG lock-in
You don't ever have to even sign into FAANG if you can put up with inconvenience.
- Buy a U2F FIDO key like OPEN SOURCE https://solokeys.com/ or Yubikey etc
- Thetis, Yubikey, Solokey, Nitrokey, Onlykey, etc. Differences and Compatability?
- Yubico is merging with ACQ Bure and intends to go public
-
alternative to yubikey with requirements?
Try Solokeys https://solokeys.com v2 is open source USB-C and NFC compatible work with FIDO and web Auth.
- How to Yubikey: A Configuration Cheatsheet
- GitHub Mandates 2FA for All Developers
- The Blue Is Gone
-
On using bitwarden for TOTP:
Also take a look at solokeys. They are very affordable and support FIDO2 and FIDO U2F -- meaning they have overlapping protocols with Bitwarden, and they certainly work on Google.
-
Wanting to setup a luks USB key system
Try This
-
Sign in with Google has been removed for your privacy
You might want to check out https://solokeys.com/ then. They're pretty new (shipping for about a year) but they do full FOSS firmware & software as well as most hardware being FOSS as well.
What are some alternatives?
IsoApplet - A Java Card PKI Applet aiming to be ISO 7816 compliant
YubiKey-Guide - Guide to using YubiKey for GnuPG and SSH
FIDO2 - FIDO2 toolbox in Java and X-FIDO JavaCard applet
KeePass2.x - unofficial mirror of KeePass2.x source code
SatochipApplet - The open source hardware wallet smartcard - Satochip.io
mortar - Framework to join Linux's physical security bricks.
yubikey-full-disk-encryption - Use YubiKey to unlock a LUKS partition
OpenSK - OpenSK is an open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.
OpenSC - Open source smart card tools and middleware. PKCS#11/MiniDriver/Tokend
trezor-hardware - :wrench: Hardware design of Trezor
yubioath-desktop - Yubico Authenticator for Desktop (Windows, macOS and Linux) and Android [Moved to: https://github.com/Yubico/yubioath-flutter]
nrf52-u2f - An Open-Source FIDO U2F implementation on nRF52 SoC