TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Who else is uncomfortable with hardware 2FA for personal use?

22 点作者 aunterste超过 2 年前
I just &#x27;aborted&#x27; my Yubikey purchase again as I started to think through how many I would need to buy and where to leave them to be sure I always have access, even if my house burns down and&#x2F;or the hardware key breaks, one gets lost etc.<p>I think hardware 2FA is great in a corporate environment where there is an administrator that can enable&#x2F;disable accounts and issue a new HW key if required.<p>For personal accounts though, I somehow feel uneasy about reliance on a small piece(s) of HW. Having a great password manager, lots of 2FA (with TOTP, where I own and back-up the secrets) and have all of that secured with a cloud backup with a super strong password that I don&#x27;t know or have to write down, but can recreate if need be (e.g. an MD-5 hash of a specific segment of a public text).<p>Too much? Anyone else has the same concerns or am I missing something?

9 条评论

saltcured超过 2 年前
I have a pretty conservative (paranoid?) security posture, where I do not want any banking app or any ability to initiate or confirm financial transactions via my smartphone. I don&#x27;t even use non-free apps because I refuse to have a credit card associated with my phone and its app store.<p>I also don&#x27;t like the idea of many sites&#x2F;services trying to roll their own 2FA and introducing custom phone apps. I frankly do not trust most vendors to design nor write secure software. I want an interoperable standard so I can choose a trusted authenticator and enroll it with as many different services as I need. I want to use such sites with my desktop&#x2F;laptop browser and like the idea of 2FA login or transaction approvals to limit the chances of unauthorized use.<p>I don&#x27;t mind using the phone as a 2FA token, but I want to have extra tokens as backup in case the phone is lost or damaged. The yubikey seemed attractive in that way, but support is not as good nor widespread as I would need.<p>I discovered absurd things like a bank allowing multiple tokens to be enrolled, but automatically expiring them if I don&#x27;t use them frequently. This blocks the idea of enrolling a backup token to store safely offline.<p>I also want to disable any SMS&#x2F;phone call&#x2F;email mechanism to do account recovery by sending secrets through an insecure channel. Otherwise, the 2FA tokens are mostly useless security theater. But, for most things I would care about personally, this is not offered even if you enroll multiple tokens.
jqpabc123超过 2 年前
<i>For personal accounts though, I somehow feel uneasy about reliance on a small piece(s) of HW.</i><p>Most people already have a small piece of hardware called a phone that can be applied to the same effect.<p>Free&#x2F;open source TOTP apps are readily available for both iOS and Android. This isn&#x27;t rocket science, it&#x27;s a simple SHA hash that either works or it doesn&#x27;t.<p>What if you lose your phone? Remember --- this is 2FA so you need more than my phone to access my accounts. My TOTP app is password protected and I have a backup of the keys so I can easily transfer to another phone or use a desktop app to access my accounts.<p>What happens if you lose your hardware key? Perfect security does not exist.
评论 #32676396 未加载
joshenders超过 2 年前
I purchased three keys for each family member for Christmas. They’re not the most technically savvy and it hasn’t been an issue for them at all.<p>(One is on their keychain with an AirTag, one is stored securely in their home. One is stored offsite.)<p>Every site I’ve registered them with has allowed me to register all three keys. Nobody has lost a key yet (thanks AirTag) but it wouldn’t be a huge ordeal if they did. Just delete that key from their services and use a backup.
nimih超过 2 年前
You should really start by thinking through your so-called &quot;threat model&quot;: what are the things you&#x27;re actually trying to protect against, and what risks are you comfortable with? There&#x27;s never going to be a perfectly secure solution, so you should really be trying to enumerate and assess the trade-offs you&#x27;re making and whether they&#x27;re worth it.<p>Speaking personally, I feel like my primary concerns are:<p>- ease of use (if something is a pain in the ass, I&#x27;ve found I won&#x27;t use it in practice, in spite of what I know is in my best interest)<p>- credential stuffing&#x2F;data breaches<p>- phishing<p>- getting locked out of my accounts due to losing my credentials<p>In particular, I think that, although a password manager plus any sort of 2FA mitigates credential stuffing concerns pretty well, HW 2FA is probably more effective against phishing compared to a TOTP app or email 2FA[1]. Purchasing a single backup key that I have a trusted family member hold on to, plus printing out recovery codes and storing them in the same place I keep other important personal documents (passport, birth certificate), is for me is a pretty reasonable hedge against lost credentials[2]. I also personally find HW 2FA to be much more convenient than TOTP authenticator apps in general[3]. Thus, I use a hardware 2FA token (at least for &quot;important&quot; accounts) and sleep pretty soundly at night, but that&#x27;s very much the result of my own specific concerns, preferences, and priorities.<p>[1] A hardware key is able to validate the domain directly and mainly relies on the browser not fucking up[1a], whereas SMS&#x2F;email&#x2F;TOTP tokens require the user to evaluate the authenticity of the form they&#x27;re filling out. Obviously there&#x27;s some subtlety here, since a PW manager browser extension can also do domain validation, but at the end of the day, I think there&#x27;s some non-trivial benefit to using a HW token.<p>[1a] Chrome&#x27;s WebUSB API is an interesting case study here.<p>[2] I actually lost my primary HW token earlier this year, and so got the opportunity to test out my recovery plan. Having done so, I&#x27;d recommend anyone who depends on HW tokens to go through a similar exercise (preferably simulated, rather than &quot;for real&quot;), if nothing else than to get some very satisfying peace of mind.<p>[3] I suspect this is not a universally held opinion.
raxxorraxor超过 2 年前
I mostly use a prefix generated from the name of the service + the yubikey button to paste the rest. If my key would fail I still have pwd reset options and I keep a copy of it in a password safe. That said, the dongle is a few years old and it still seems to work just fine while being subjected to mechanical strain from other keys.<p>I dislike any form of 2FA with my phone involved. Low battery, low privacy, phones just generally suck if they are involved in security. I would even prefer the old SMS while being staunchly aware that and code will be send in free text.<p>Still better than some shitty random app from the shitty app store.<p>I would be careful about a hash of a public text. I certainly would at least XOR it with secret value, even if its appearance in rainbow tables is very unlikely.
travisporter超过 2 年前
Slightly related, I paid for and use the OTP auth app on ios which syncs via icloud. I just wish I had an old-school hardware token that would sync with it (like this <a href="https:&#x2F;&#x2F;www.token2.com&#x2F;shop&#x2F;product&#x2F;token2-molto-1-i-multi-profile-totp-hardware-token" rel="nofollow">https:&#x2F;&#x2F;www.token2.com&#x2F;shop&#x2F;product&#x2F;token2-molto-1-i-multi-p...</a>)
shaftway超过 2 年前
I would never use a hardware 2FA on any service with no other way in. But that doesn&#x27;t make them not-valuable. For me the ideal setup is a service that offers a SMS verification code or a 2FA token. The 2FA is far more convenient for me, but if I don&#x27;t have it the SMS is there as a backup and I can get in to unregister or register a new 2FA token.
评论 #32681283 未加载
aborsy超过 2 年前
I am uncomfortable from another direction. Yubikey is closed source. It could contain a vulnerability or backdoor that allows extraction of secrets whenever connected (without PIN or password).<p>What are the chances?
h2odragon超过 2 年前
Do you really need that much security? What is it you&#x27;re securing, exactly? Neither my cookie recipe nor the extensive collection of h0rse is worth a great deal of effort to deny others access; I don&#x27;t have <i>need</i> for obtrusive security measures.<p>If you do have secrets that are valuable enough to justify the effort; have you really put in the effort to secure them? Or have you got multifactor authentication and fancy encryption happening on a system that&#x27;s physically available to anybody from the janitorial services company all night? The equivalent of a big impressive vault door standing alone without walls around it.