New Yubico security keys let you log in with a tap to your USB-C port

This page summarizes the projects mentioned and recommended in the original post on reddit.com/r/privacytoolsIO

Our great sponsors
  • Scout APM - Less time debugging, more time building
  • SonarLint - Deliver Cleaner and Safer Code - Right in Your IDE of Choice!
  • SaaSHub - Software Alternatives and Reviews
  • pass-import

    A pass extension for importing data from most of the existing password manager.

    I've been using one as an OpenPGP smartcard to encrypt my pass password database. Each password file can only be decrypted with the Yubikey, and the private key is kept in the tamper-resistant processor on the key. I have a PIN set on the key with lockout enabled - so if the key is stolen, an attacker only gets a few tries before the key locks itself out. It's effectively a fully local 2FA password management solution. I handle syncing the encrypted password store between devices using git.

  • YubiKey-Guide

    Guide to using YubiKey for GPG and SSH

    There's a good setup guide here that goes through key generation and provisioning using a LiveUSB: https://github.com/drduh/YubiKey-Guide. If you follow that guide, the only two copies of your private key will be on your Yubikey (hardened, not supposed to be extractable) and on your backup flash drive.

  • Scout APM

    Less time debugging, more time building. Scout APM allows you to find and fix performance issues with no hassle. Now with error monitoring and external services monitoring, Scout is a developer's best friend when it comes to application development.

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts