Yall are gonna make Amal have a field day. He already has a thing about testing bracelets.
Alright, so preface I only watched 3 minutes of that video. That being said, 100uW is only useful for like 2 applications, and we happen to be one of them. My real concern is less the viability of the tech and more the commercial availability
Yep I agree @Satur9 I just thought it was funny that I finished watching that video only around 20minutes befor Pilgrimsmaster posted
Spooky, get out of my head Rhys
100uW ⊠yeah I think I got more power from my subdermal solar panel experiment, and that wasnât even nominal conditions. Still, there is something interesting about a power source that constantly supplies 100uW day or night for years and years. Tritium beta-voltaic batteries decline ârelativelyâ rapidly over a 12-15 year life.
New Yubikeys have NFC
Is there a benefit to using Yubikey over waiting for the Apex line?
If I understand correct, the Apex line will do what the Yubikey can do.
You answered your own question:
So the benefit is that is is currently released. I would still need to talk to Amal to see if it can be made into an implant. What do you think @Amal? I can go in on a 10 pack, or send you a 2 pack. https://www.yubico.com/product/yubikey-5c-nfc
Honestly that is all I want is to have an implanted, password keychain. My memory has been declining.
actually they have had nfc for a long time⊠iâve been toying with my yubikey neo (with nfc) for years⊠the ânewâ part about their recent marketing campaign is that they changed the USB connector from type A to USB-C ⊠fancy
Itâd be a real pain in the ass to do that. Iâve taken apart several yubikey fobs and the giant rigid board and special anti-tamper resins they use make the whole thing bulky AF and not really able to be trimmed down at all. Youâd have to put layers upon layers of stuff on it and youâd end up with a brick under your skin⊠oh and the âspecial touch buttonâ may or may not be permanently âpushedâ since it is a capacitance sensor⊠no idea what that would do to functionality.
Nothing on one, a little click out of twoâŠ
Hey! So on the topic of Yubikey, seeing as a lot of you know a lot about it, I just got one and was wondering a little something. Ive been reading about using it to secure my windows login and was wondering if itâs worth it in your opinion. Is it overkill on a personal laptop? I just find it to be a cool tool and want to utilize it the best I can.
In my personal opinion (Iâm nowhere near as knowledgeable with this stuff as the other guys here) for a Windows login you could just go with an xEM or probably for better a NExT paired with the KBR1
Edit: Or even using an ACR122U with the ISLOG software
Yes, for login onto a computer in a non-critical security environment. Otherwise, fugetaboutit.
xNT or NExT would be the options. xEM is LF, KBR1 is HF
This is the big one - whatâs your threat model? On a laptop that just logs in to Facebook and is stored at your house, probably good to use a KBR.
Depends what is on the laptop. It will improve security at the cost of convenience. If youâre studying to be a journalist and fear your government then its worth it. If you suspect your housemate will try and snoop on your private info then (you need a new housemate, but) its worth it. Security always costs convenience, choose the balance that suits your assessment of the risks.
The issue is not the reader but the chip. Non-crypto chips are essentially readily-readable memory stores - meaning anyone who can read your chip gains access to whatever the chip is âprotectingâ. However thatâs fine in many settings - like a home computer that you donât want your spouse or nosy kids to access, your work computer, some cabinet in your office, a machine tool in a factory⊠If you want to use such chips for banking credentials however, youâre bonker.
Having said that, thereâs also the fact that implants are on you and have a very limited read range. That alone bumps up the security considerably, as nobody can really sneak by you and casually read your chip as long as youâre awake and youâre not boozed up. Itâs not proper security, but itâs a step up compared to a coin a credit card format tag.
And then there are mitigations strategies that use âless secureâ chips like the Mifare Classic that seem fairly successful. Like for example my door lock at home, that uses rolling codes on encrypted sectors. The only way into my house would be to approach me while Iâm sleeping with a Proxmark3, then spend 5 to 20 minutes hardnesting the current content out of the chip, then duplicate it on a blank M1k and get into my house before I do. Yes, itâs not proper security, but the attack vector starts to become really quite unlikely. Not to mention, it wouldnât be covert entry, as I would know immediately someone got in when my door would reject my own chip.
So, unsecure chips have their uses. Itâs not all good for the trash.
Oh absolutely, in fact I still use EM4100 for a lot of stuff.
True, but worth noting security is a combination of both. Itâs entirely possible to use a secure chip in an insecure way, or to combine an insecure chip with other factors to make a reasonably secure system
Thanks for the info everyone! Security overkill is fun. Sometimes Iâll use a VPN over Tor just for giggles. I guess in my situation using a Yubikey for my laptop is pretty much the same thing.
Also, Iâve been thinking about using my implants ID as an encryption password for an external hard drive. Dunno if thatâs considered low-risk or not.
Donât forget when the Apex line comes out, there are multiple some applets that might be of interest to you also
Anyone in the market for 1 or 2 unused and unopened xg3âs? Iâm looking to get rid of them to help pay for a titan lol!