Phone May Soon Replace Many of Your Passwords

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
  • kr

    Discontinued DEPRECATED A dev tool for SSH auth + Git commit/tag signing using a key stored in Krypton.

  • Like the acquired/abandoned https://github.com/kryptco/kr [key stored in a [...] mobile app] with iOS and Android apps all under an "All Rights Reserved"-source license?

    > *

  • OpenSK

    OpenSK is an open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.

  • There are a number of FOSS solutions.

    - https://github.com/google/OpenSK <- DIY solution

    - https://solokeys.com/

    - https://www.nitrokey.com/

    The issue with any FOSS solution is that FIDO requires an attestation private key which is shared between a batch of at least 100,000 security keys. Using a DIY or cli app (application running on the host) solution will likely mean you'll be generating that private key yourself, this makes you identifiable across registrations.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
  • nitrokey-fido2-firmware

    FIDO2 USB token optimized for security, extensibility, and style. A fork of Solo key.

  • There are a number of FOSS solutions.

    - https://github.com/google/OpenSK <- DIY solution

    - https://solokeys.com/

    - https://www.nitrokey.com/

    The issue with any FOSS solution is that FIDO requires an attestation private key which is shared between a batch of at least 100,000 security keys. Using a DIY or cli app (application running on the host) solution will likely mean you'll be generating that private key yourself, this makes you identifiable across registrations.

  • solo1

    Solo 1 firmware in C

  • There are a number of FOSS solutions.

    - https://github.com/google/OpenSK <- DIY solution

    - https://solokeys.com/

    - https://www.nitrokey.com/

    The issue with any FOSS solution is that FIDO requires an attestation private key which is shared between a batch of at least 100,000 security keys. Using a DIY or cli app (application running on the host) solution will likely mean you'll be generating that private key yourself, this makes you identifiable across registrations.

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Yubico is merging with ACQ Bure and intends to go public

    6 projects | news.ycombinator.com | 19 Apr 2023
  • alternative to yubikey with requirements?

    1 project | /r/privacy | 20 Mar 2023
  • GitHub Mandates 2FA for All Developers

    1 project | /r/cybersecurity | 9 Mar 2023
  • On using bitwarden for TOTP:

    1 project | /r/Bitwarden | 1 Feb 2023
  • Wanting to setup a luks USB key system

    1 project | /r/linuxquestions | 24 Jan 2023