This is nice… I saw several videos with titles like “how yubikey works”, but never mentioned how it works. They just demonstrate how it is used which is more like “how to use yubikey”. Your video is the first one I found explaining how it works.
Thanks for the nice feedback. It take a little more work, but we try to thoroughly explain everything. Unfortunately the video only has 800 views. Could we ask a favor? Would you please consider sharing this out with friends & coworkers? We believe this video is important for everyone to understand why the security of these keys are useful. Thank you!
Thank You for the video! question I bought 2 Yubico keys and used them to secure my Apple ID on my Mac Pro and I phone, does that automatically Locke my Apple ID on my iPad Pro or do I need to use yubi keys for the I pad also. Thanks for your help!!
When you add a security key to your apple device you are actually adding it to your apple ID. When the keys are first added you will be presented with 1 of 2 options: 1) add the key to all other devices (or else they will be signed out of the account or 2) Remove older devices that are not compatible with the HW security key. Please see our video: ruclips.net/video/0vkrxCCm8Fw/видео.html Appreciate the comments and great questions! Thanks for subscribing!
Did you enjoy the video? It take a little more work, but we try to thoroughly explain everything. Unfortunately the video only has 800 views. Could we ask a favor? Would you please consider sharing this out with friends & coworkers? We believe this video is important for everyone to understand why the security of these keys are useful. Thank you!
@CyberMedics but if public_key encrypts the challenge and sends it to relaying party, then any1 can intercept and transmission getting public_key so they can impersonate the actual user, I thinks it private_key signed the challenge (which rsa and ec can do) and send the public_key and signed challenge to rp Please confirm, I am also confused ATECC608[A or B] might be used
It is hard to keep this all straight. Apologize that my previous answer was wrong/incomplete. I deleted my previous comment so as not to confuse others. I have confirmed the information in the video & provided some links below. Private Key Encrypts the challenge auth0.com/blog/what-is-a-yubikey-and-how-to-set-it-up-with-auth0/ HMAC SHA1 algorithm docs.yubico.com/hardware/yubikey/yk-5/tech-manual/yk5-apps.html#hmac-sha1-challenge-response Please let us know you received this update.
Use a Yubikey. But no big deal. My bank uses 8-12 number password only, no 2fa. There is lots of work to do. Even Amazon does not do security keys here.
This is nice… I saw several videos with titles like “how yubikey works”, but never mentioned how it works. They just demonstrate how it is used which is more like “how to use yubikey”. Your video is the first one I found explaining how it works.
Thanks for the nice feedback. It take a little more work, but we try to thoroughly explain everything. Unfortunately the video only has 800 views. Could we ask a favor? Would you please consider sharing this out with friends & coworkers? We believe this video is important for everyone to understand why the security of these keys are useful. Thank you!
So a Yubikey can be used on an unlimited number of sites using FIDO, but only 25 that use FIDO2?
You are correct. Unlimited for FIDO U2F. 25 for FIDO2.
Yahoo alright 👍👍
Did you enjoy the video. If so, please share the content with your friends & coworkers. Thank you!
Thank You for the video! question I bought 2 Yubico keys and used them to secure my Apple ID on my Mac Pro and I phone, does that automatically Locke my Apple ID on my iPad Pro or do I need to use yubi keys for the I pad also. Thanks for your help!!
When you add a security key to your apple device you are actually adding it to your apple ID. When the keys are first added you will be presented with 1 of 2 options: 1) add the key to all other devices (or else they will be signed out of the account or 2) Remove older devices that are not compatible with the HW security key. Please see our video: ruclips.net/video/0vkrxCCm8Fw/видео.html Appreciate the comments and great questions! Thanks for subscribing!
Did you enjoy the video? It take a little more work, but we try to thoroughly explain everything. Unfortunately the video only has 800 views. Could we ask a favor? Would you please consider sharing this out with friends & coworkers? We believe this video is important for everyone to understand why the security of these keys are useful. Thank you!
Thank You!!
Do you us a hardware security key? If so, what brand of key do you use?
hi could you do a video on setting up yubi keys with I password please! thanks
We will put it in the que (1password.com/). I think 1passowrd is a 1st rate service.
How can private_key encrypt challenge
Both RSA and EC private_key can't perform this action, which is that algorithm is used?
@CyberMedics but if public_key encrypts the challenge and sends it to relaying party, then any1 can intercept and transmission getting public_key so they can impersonate the actual user, I thinks it private_key signed the challenge (which rsa and ec can do) and send the public_key and signed challenge to rp
Please confirm, I am also confused
ATECC608[A or B] might be used
It is hard to keep this all straight. Apologize that my previous answer was wrong/incomplete. I deleted my previous comment so as not to confuse others. I have confirmed the information in the video & provided some links below.
Private Key Encrypts the challenge
auth0.com/blog/what-is-a-yubikey-and-how-to-set-it-up-with-auth0/
HMAC SHA1 algorithm
docs.yubico.com/hardware/yubikey/yk-5/tech-manual/yk5-apps.html#hmac-sha1-challenge-response
Please let us know you received this update.
Use a Yubikey. But no big deal. My bank uses 8-12 number password only, no 2fa. There is lots of work to do. Even Amazon does not do security keys here.
Thanks for commenting and subscribing. We use yibikey, authentrend, and feitian.
Can you recover my gmail
Account recovery is the only way to recover an account. Do you know the password?