IsoApplet
solo1
IsoApplet | solo1 | |
---|---|---|
2 | 57 | |
158 | 2,260 | |
- | 0.0% | |
4.0 | 0.0 | |
4 months ago | over 1 year ago | |
Java | C | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
IsoApplet
- A sane SSH(1) key management example
-
Security keys are now supported for SSH Git operations
If you're interested in contactless cards with an option in the future to upgrade to something like Omni ring (https://store.nfcring.com/products/omni), then do this:
1) Buy a contactless card reader from a good source e.g. https://www.javacardsdk.com/product/acr1252u or last two from this table https://webshop.d-logic.net/nfc-rfid-device-comparison, don't buy NFC ones, you need smartcard support specifically.
Also steer clear of cheep ACR122U readers from ebay or ali, for some reason there are a lot of fakes https://www.acs.com.hk/en/press-release/2266/advanced-card-s...
2) Buy a few of contactless cards e.g. https://www.javacardsdk.com/product/j3h145/, don't buy EMV ones unless you're Europay, Mastercard or VISA.
3) Once you get them install opensc, pcsc-lite, ccid and get gp.jar from https://javacard.pro/globalplatform/ and read some pages from https://github.com/philipWendland/IsoApplet/wiki, it will get you started.
solo1
-
Passkey Implementation: Misconceptions, pitfalls and unknown unknowns
All phones ask for PIN or pattern in addition to face/fingerprint. Use that.
For the average user this is safe enough. (i.e) keep google/apple password safe. Then all is fine.
> exporting and FAANG lock-in
You don't ever have to even sign into FAANG if you can put up with inconvenience.
- Buy a U2F FIDO key like OPEN SOURCE https://solokeys.com/ or Yubikey etc
- Thetis, Yubikey, Solokey, Nitrokey, Onlykey, etc. Differences and Compatability?
- Yubico is merging with ACQ Bure and intends to go public
-
alternative to yubikey with requirements?
Try Solokeys https://solokeys.com v2 is open source USB-C and NFC compatible work with FIDO and web Auth.
- How to Yubikey: A Configuration Cheatsheet
- GitHub Mandates 2FA for All Developers
- The Blue Is Gone
-
On using bitwarden for TOTP:
Also take a look at solokeys. They are very affordable and support FIDO2 and FIDO U2F -- meaning they have overlapping protocols with Bitwarden, and they certainly work on Google.
-
Wanting to setup a luks USB key system
Try This
-
Sign in with Google has been removed for your privacy
You might want to check out https://solokeys.com/ then. They're pretty new (shipping for about a year) but they do full FOSS firmware & software as well as most hardware being FOSS as well.
What are some alternatives?
YubiKey-Guide - Guide to using YubiKey for GnuPG and SSH
android-usb-gadget - Convert your Android phone to any USB device you like! USB Gadget Tool allows you to create and activate USB device roles, like a mouse or a keyboard. 🛠🛡📱
KeePass2.x - unofficial mirror of KeePass2.x source code
SatochipApplet - The open source hardware wallet smartcard - Satochip.io
mortar - Framework to join Linux's physical security bricks.
GlobalPlatformPro - 🌐 🔐 Manage applets and keys on JavaCard-s like a pro (via command line or from your Java project)
OpenSK - OpenSK is an open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.
ejbca-ce - EJBCA® – Open-source public key infrastructure (PKI) and certificate authority (CA) software.
trezor-hardware - :wrench: Hardware design of Trezor
secretive - Store SSH keys in the Secure Enclave
yubioath-desktop - Yubico Authenticator for Desktop (Windows, macOS and Linux) and Android [Moved to: https://github.com/Yubico/yubioath-flutter]