Thanks alot for clarifying the difference of U2F and HMAC (Yubikey) functionality. I hoped to get a system running where the malware of an infected device couldn't get access to the data in the kdbx-file just by copying the database, the keyfile (usb) and logging the password. In my view, the system is secure when an attacker must also be in posession of a physical hardware token, where the key never leaves this token. But this seems unattainable with a static encrypted database.
You mean the yubikey approach is nothing better than putting a passwordfile on an usb-stick?
Hey again, thanks for pushing this topic since my last post in 2015. Though, it's sad, that no skilled developer catched up this task yet (as i know). I never wrote a plugin, but i certainly could if only i had enough time. But time is money, so i could offer an incentive for the developer or team who releases a working beta or/and a reviewed plugin: Beta: 0.1 BTC Reviewed Release: another 0.2 BTC Current Rate (31.08.2017): $4066/BTC So i offer $1220 at the current rate for the development of a secure,...
Hey again, thanks for pushing this topic since my last post in 2015. Though, it's sad, that no skilled developer catched up this task yet (as i know). I never wrote a plugin, but i certainly could if only i had enough time. But time is money, so i could offer an incentive for the developer or team who releases a working beta or/and a reviewed plugin: Beta: 0.1 BTC Reviewed Release: another 0.2 BTC Current Rate (31.08.2017): $4066/BTC So i offer $1220 at the current rate for the development of a secure,...
I hope this topic gets attention again. Hardware-based 2nd factor authentication...
I hope this topic gets attention again. Hardware-based 2nd factor authentication...
Thats exactly what i'm searching for, too. Will jump in and sponsor $20 when this...
I own a HyperFIDO-Security Token from HYPERSECU. This works perfect with Chrome and...