home.social

#hwfido2provider — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #hwfido2provider, aggregated by home.social.

  1. I've just published the first v1.0.0 release candidate for Passchain (formerly HW Fido2 Provider)!

    This is a big step from something that kind of work enough to be able to use security keys without the Play Services [1][2] to a more stable app.

    Among other things, it benefit from the recent improvement made for the feature on microG (it uses its lib): for example we now have cross-device login => you can theoretically login on your TV with your Yubikey now 😃

    [1] or microG
    [2] there are now other apps like Authnkey that allow it. They didn't exist when I started Passchain, the Play Service was the only way to use them on Android

    #passchain #hwFido2Provider #passkey #fido2 #yubikey #android #microg

  2. I've just published the first v1.0.0 release candidate for Passchain (formerly HW Fido2 Provider)!

    This is a big step from something that kind of work enough to be able to use security keys without the Play Services [1][2] to a more stable app.

    Among other things, it benefit from the recent improvement made for the feature on microG (it uses its lib): for example we now have cross-device login => you can theoretically login on your TV with your Yubikey now 😃

    [1] or microG
    [2] there are now other apps like Authnkey that allow it. They didn't exist when I started Passchain, the Play Service was the only way to use them on Android

    #passchain #hwFido2Provider #passkey #fido2 #yubikey #android #microg

  3. I've just published the first v1.0.0 release candidate for Passchain (formerly HW Fido2 Provider)!

    This is a big step from something that kind of work enough to be able to use security keys without the Play Services [1][2] to a more stable app.

    Among other things, it benefit from the recent improvement made for the feature on microG (it uses its lib): for example we now have cross-device login => you can theoretically login on your TV with your Yubikey now 😃

    [1] or microG
    [2] there are now other apps like Authnkey that allow it. They didn't exist when I started Passchain, the Play Service was the only way to use them on Android

    #passchain #hwFido2Provider #passkey #fido2 #yubikey #android #microg

  4. I've just published the first v1.0.0 release candidate for Passchain (formerly HW Fido2 Provider)!

    This is a big step from something that kind of work enough to be able to use security keys without the Play Services [1][2] to a more stable app.

    Among other things, it benefit from the recent improvement made for the feature on microG (it uses its lib): for example we now have cross-device login => you can theoretically login on your TV with your Yubikey now 😃

    [1] or microG
    [2] there are now other apps like Authnkey that allow it. They didn't exist when I started Passchain, the Play Service was the only way to use them on Android

    #passchain #hwFido2Provider #passkey #fido2 #yubikey #android #microg

  5. I've just published the first v1.0.0 release candidate for Passchain (formerly HW Fido2 Provider)!

    This is a big step from something that kind of work enough to be able to use security keys without the Play Services [1][2] to a more stable app.

    Among other things, it benefit from the recent improvement made for the feature on microG (it uses its lib): for example we now have cross-device login => you can theoretically login on your TV with your Yubikey now 😃

    [1] or microG
    [2] there are now other apps like Authnkey that allow it. They didn't exist when I started Passchain, the Play Service was the only way to use them on Android

    #passchain #hwFido2Provider #passkey #fido2 #yubikey #android #microg

  6. Registrations of non-discoverable passkeys are now supported by #Vanadium:

    github.com/GrapheneOS/Vanadium

    The non-discoverable keys are often used without PIN as a 2FA, like on Codeberg, Gitea, etc. Or they are used with a PIN but after requesting the username, like on Nextcloud.

    Using non-discoverable key with a PIN after requesting the username has the advantage to not use one of the slots of the key manager - which are often limited on hardware tokens - but may allow someone to verify if a username is known by the application (most of the time, this is possible with other features too). So it can be a great compromise, especially if the user is able to choose what kind of key they want to use.

    It's now possible to register them on any credential manager (like #KeePassDX or #HWFido2Provider)

    For the record, Firefox has fixed it recently too

    #Passkeys #Fido2 #Android #GrapheneOS