trabucco
virtual-fido
trabucco | virtual-fido | |
---|---|---|
2 | 15 | |
5 | 1,140 | |
- | 1.1% | |
0.0 | 7.7 | |
8 months ago | 1 day ago | |
C++ | C | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
trabucco
- Mozilla claims Apple, Google and Microsoft force users to use default browsers
-
I just checked out settings, never realized it has so many features
I have written trabucco https://github.com/ltworf/trabucco to be very predictable. It's available on debian and derivatives.
virtual-fido
- Tailscale doesn't want your password
-
Passkeys now support external providers
> who the heck would carry a USB key with them??
Why not? I do this. It's no different from any other physical key like a door key, and I keep it on the same keychain too...
> The passkey is usable anywhere (signed up on my desktop, hopped over to my laptop and signed in there with the same passkey).
I don't see how this conflicts with physical tokens like Yubikeys? The tokens help you "remember" the key like how a physical door key helps you "remember" the bitting (which is the real authentication info).
Just like passkeys, U2F can also be done using a virtual U2F device if you so choose (https://github.com/bulwarkid/virtual-fido). And presumably you could create an off-device portable token to store passkeys...
The real problem at the end of the day is just consistent adoption. There's still a ton of 2FA services that don't accept U2F and only use SMS or email codes...
-
Google Introduces Passkey Authentication
If this is FIDO2, then it seems these projects might be useful on Linux...
https://github.com/bulwarkid/virtual-fido
https://bulwark.id/
-
Is there a linux equivalent to Windows Hello?
Suggested solution: https://github.com/bulwarkid/virtual-fido
- On-device WebAuthn and what makes it hard to do well
- GitHub - bulwarkid/virtual-fido: A Virtual FIDO2 USB Device
-
Mozilla claims Apple, Google and Microsoft force users to use default browsers
You can use an open source virtual FIDO device instead of Apple's implementation:
https://github.com/bulwarkid/virtual-fido/
-
Hacker News top posts: Sep 18, 2022
Show HN: A virtual Yubikey device for 2FA/WebAuthN\ (104 comments)
- Show HN: A virtual Yubikey device for 2FA/WebAuthN
What are some alternatives?
Ulauncher - Feature rich application Launcher for Linux
tpm-fido - A WebAuthn/U2F token protected by a TPM (Go/Linux)
pam-u2f - Pluggable Authentication Module (PAM) for U2F and FIDO2
PIVert
j40 - J40: Independent, self-contained JPEG XL decoder
SoftU2F - Software U2F authenticator for macOS
SoftU2F-Win - Software U2F authenticator for Windows
solo1 - Solo 1 firmware in C
pass-import - A pass extension for importing data from most existing password managers
ungoogled-chromium - Google Chromium, sans integration with Google
softfido - A software FIDO2/U2F authenticator
vsmartcard - umbrella project for emulation of smart card readers or smart cards