Our great sponsors
solo1 | solo2 | |
---|---|---|
56 | 5 | |
2,260 | 545 | |
0.0% | 2.4% | |
0.0 | 0.0 | |
over 1 year ago | over 1 year ago | |
C | Rust | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
solo1
- Thetis, Yubikey, Solokey, Nitrokey, Onlykey, etc. Differences and Compatability?
- Yubico is merging with ACQ Bure and intends to go public
-
alternative to yubikey with requirements?
Try Solokeys https://solokeys.com v2 is open source USB-C and NFC compatible work with FIDO and web Auth.
- How to Yubikey: A Configuration Cheatsheet
- GitHub Mandates 2FA for All Developers
- The Blue Is Gone
-
On using bitwarden for TOTP:
Also take a look at solokeys. They are very affordable and support FIDO2 and FIDO U2F -- meaning they have overlapping protocols with Bitwarden, and they certainly work on Google.
-
Wanting to setup a luks USB key system
Try This
-
Sign in with Google has been removed for your privacy
You might want to check out https://solokeys.com/ then. They're pretty new (shipping for about a year) but they do full FOSS firmware & software as well as most hardware being FOSS as well.
-
Security keys opinion
yubikey is always recommend but solokey is open source
solo2
-
Ask HN: Has any Rust developer moved to embedded device programming?
https://github.com/solokeys/solo2/blob/main/runners/lpc55/Ma...
Similarly, for testing, one annoyance for us is that in theory the user should press a button for every action. We have a feature to disable that, just so we can run integration tests (either on PC or on device) more smoothly.
- Solokeys - Solo 2 firmware
-
Should I Buy something Like A Yubikey?
there is an opensource alternative https://github.com/solokeys/solo2
-
Are there any devices with Rust firmware?
The upcoming solo v2 security key is built on Rust firmware (v1 was a C/C++ firmware).
What are some alternatives?
YubiKey-Guide - Guide to using YubiKey for GnuPG and SSH
keyberon - A rust crate to create a pure rust keyboard firmware.
KeePass2.x - unofficial mirror of KeePass2.x source code
esp-rust-board - Open Hardware with ESP32-C3 compatible with Feather specification designed in KiCad
mortar - Framework to join Linux's physical security bricks.
std-training - Embedded Rust on Espressif training material.
OpenSK - OpenSK is an open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.
rp2040-mandel-pico - A small Mandelbrot demonstrator for the LILYGO T-Display RT2040 written in Rust
trezor-hardware - :wrench: Hardware design of Trezor
MIO - Metal I/O library for Rust.
yubioath-desktop - Yubico Authenticator for Desktop (Windows, macOS and Linux) and Android [Moved to: https://github.com/Yubico/yubioath-flutter]
carbon-lang - Carbon Language's main repository: documents, design, implementation, and related tools. (NOTE: Carbon Language is experimental; see README)