TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Google Determines that FIDO U2F Security Keys Improve Security

49 pointsby willow9886over 8 years ago

11 comments

dgacmuover 8 years ago
The FIDO&#x2F;Google blog post about it: <a href="https:&#x2F;&#x2F;fidoalliance.org&#x2F;case-study-series-google-security-keys-work&#x2F;" rel="nofollow">https:&#x2F;&#x2F;fidoalliance.org&#x2F;case-study-series-google-security-k...</a><p>And the actual study: <a href="http:&#x2F;&#x2F;fc16.ifca.ai&#x2F;preproceedings&#x2F;25_Lang.pdf" rel="nofollow">http:&#x2F;&#x2F;fc16.ifca.ai&#x2F;preproceedings&#x2F;25_Lang.pdf</a><p>(Which helps answer some of the arguments in the discussion thus far. In particular, on page 11, they list the systems they compare against: SMS OTP, Google phone-based OTP, and three hardware tokens, including the FIDO U2F. They compare in Figure 6 explicitly with SMS OTP and app-based OTP.)
spqr0a1over 8 years ago
The comparison is to &quot;One Time Passwords (OTP)via SMS phone messages.&quot;<p>Given the vulnerabilities in GSM, that&#x27;s not a high bar. <a href="http:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;11493&#x2F;" rel="nofollow">http:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;11493&#x2F;</a>
评论 #13128101 未加载
评论 #13127652 未加载
carlosdpover 8 years ago
Yea seems right, U2F keys are very sound security-wise. The biggest challenge I&#x27;ve found is the obvious: ease of use. It can be kinda clunky to need to pull out a key and plug it in to a USB port in order to log in to Github, for example.<p>That said, this is mitigated pretty well usually with the &quot;thumbnail USB&quot; style key (like Yubikey has) where you pretty much keep it plugged in all day and click it when you need to access something. Security is still maintained as we&#x27;re mostly concerned about remote attackers, though still a good idea to pull the key out at the end of the day or if leaving the laptop for a considerable amount of time.<p>Physical ease of use will definitely be the trick for mass adoption. I recall seeing wireless U2F keys at some point?
评论 #13127775 未加载
drewg123over 8 years ago
It would be nice if Google helped to fix the bug which causes Chromium to crash on *BSD when presented with a U2F auth req. (<a href="https:&#x2F;&#x2F;bugs.chromium.org&#x2F;p&#x2F;chromium&#x2F;issues&#x2F;detail?id=451248" rel="nofollow">https:&#x2F;&#x2F;bugs.chromium.org&#x2F;p&#x2F;chromium&#x2F;issues&#x2F;detail?id=451248</a>)<p>Ever since adopting a security key, I&#x27;ve had to set my user-agent to Firefox (to prevent the U2F auth attempt) and fall back to Google Authenticator for 2FA.
Corradoover 8 years ago
One thing that struck me while reading this announcement is that if Apple had gotten on board with this idea the latest MacBook Pro may have had a better reception. Imagine hardware specifically built into your laptop to facilitate FIDO U2F security keys. Whether that&#x27;s a device like those offered by YubiKey or an NFC reader, making U2F available and simple to use would be a great thing. Maybe it could even replace GPG&#x2F;PGP for common uses.<p>Then again, maybe the recent Bluetooth 5 announcement will be enough to drive adoption. Or possibly the next iPhone &#x2F; Pixel could act as a U2F device. Maybe then we could get &quot;normal&quot; people to use real security instead of asking them what street they grew up on or what their mother&#x27;s maiden name is.
评论 #13130823 未加载
trollbollover 8 years ago
If someone could give the U2F OpenSSH patch some love, that would make my year. <a href="https:&#x2F;&#x2F;bugzilla.mindrot.org&#x2F;show_bug.cgi?id=2319" rel="nofollow">https:&#x2F;&#x2F;bugzilla.mindrot.org&#x2F;show_bug.cgi?id=2319</a>
willow9886over 8 years ago
Updated the title to specify SMS OTP.
评论 #13127470 未加载
chaz6over 8 years ago
That&#x27;s great, but when I try to use a NFC FIDO U2F key with my Google account, it says &quot;Security Keys are not support on your device.&quot; The same key on the same device works just fine on Github (running Chrome for Android).
j_sover 8 years ago
How can I use U2F for Windows sign-on? Windows 10 &quot;Hello&quot; stuff is apparently in the pipeline, but I need U2F domain authentication for Windows 7+.<p>Also curious if I can use a U2F for anything PGP-related, signing or encrypting regular stuff.<p>All this to save $20&#x2F;piece!
评论 #13128171 未加载
macraelover 8 years ago
So is Yubikey and implementation of this standard or a competitor?
评论 #13127763 未加载
评论 #13128121 未加载
评论 #13127750 未加载
eridiusover 8 years ago
Highly misleading headline (EDIT: Title has now been changed). From the article:<p>&gt; <i>including One Time Passwords (OTP)via SMS phone messages</i><p>That &quot;SMS&quot; bit is critical. OTP over SMS sucks. OTP using the same app that already manages my passwords (1Password) is a breeze. Sure, if I had a U2F Security Key already plugged in, then it would probably be even faster, but the downside is I need to have a physical key plugged in, and if I don&#x27;t have that key with me then I&#x27;m screwed (whereas with 1Password I can get at my OTP codes from any of my devices).
评论 #13127588 未加载
评论 #13127404 未加载
评论 #13127259 未加载
评论 #13127522 未加载
评论 #13127136 未加载