Nitrokey[1] is about the same price as Yubico but has <i>open source firmware & hardware</i>. You might also know them as CryptoStick[2].<p>[1] <a href="https://www.nitrokey.com/" rel="nofollow">https://www.nitrokey.com/</a><p>[2] <a href="https://blog.mozilla.org/security/2013/02/13/using-cryptostick-as-an-hsm/" rel="nofollow">https://blog.mozilla.org/security/2013/02/13/using-cryptosti...</a>
May I offer my article on an excellent password manager complementing the Yubico devices well? <a href="https://drupalwatchdog.com/blog/2015/6/yubikey-neo-and-better-password-manager-pass" rel="nofollow">https://drupalwatchdog.com/blog/2015/6/yubikey-neo-and-bette...</a>
Just so it's clear, the previous Yubikey NEO also supports gpg-agent for SSH authentication, not just the new Yubikey 4. I've been using one for months. It presents a standard smarcard CCID interface and runs an OpenPGP applet.<p>The source to the actual Javacard applet that implements is available on Github: <a href="https://github.com/Yubico/ykneo-openpgp" rel="nofollow">https://github.com/Yubico/ykneo-openpgp</a>
Buy the one with smaller form factor. the device bends with very nominal pressure and if you are someone as me who works mostly on one device and need to move around a lot with it - unplugging and replugging the key is very cumbersome. You can leave the nano one in port and forget it until you need it in another device. My two cents from using a neo to store production ssh keys.
In the article it's written that the yubikey is tamper proof.<p>This is not the case. They report their product as tamper evident but not tamper proof.
Offtopic question:<p>Is there any FDE software that supports keeping decryption keys on a network server? You would still need to enter user authentication to obtain the decryption key of course.<p>Use case: We are a HIPAA environment, I want a hard drive to be useless if it is removed from the building.
for folks interested in more on yubikeys and gpg I also would suggest these two blog posts<p><a href="http://viccuad.me/blog/secure-yourself-part-1-airgapped-computer-and-GPG-smartcards/" rel="nofollow">http://viccuad.me/blog/secure-yourself-part-1-airgapped-comp...</a><p><a href="http://blog.josefsson.org/2014/06/23/offline-gnupg-master-key-and-subkeys-on-yubikey-neo-smartcard/" rel="nofollow">http://blog.josefsson.org/2014/06/23/offline-gnupg-master-ke...</a>