Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HW button to confirm signature/key access #2

Open
breznak opened this issue May 5, 2016 · 7 comments
Open

HW button to confirm signature/key access #2

breznak opened this issue May 5, 2016 · 7 comments

Comments

@breznak
Copy link

breznak commented May 5, 2016

Hello,

I'm comparing your NitroKey to Yubikey2 HW, where I'd like to prefer your solution, mainly for it's OSS both HW & SW, and that it's made in Germany.

I missing feature I find is that yubikey has a HW button that needs to be pressed to confirm action each time the donge is to be used. Why is this missing in NitroKey? Would you plan to implement it in future generations?

@jans23
Copy link
Member

jans23 commented May 6, 2016

The reason is, that its significant effort. We will consider a button for the next major revision but its not decided and not planned yet.

@breznak
Copy link
Author

breznak commented May 6, 2016

..Ok, thanks for considering. You might want to make a poll about requested features. I introduced NitroKey to a local community and the lack of manual confirmation was the most often raised concern.

@jans23
Copy link
Member

jans23 commented May 6, 2016

Was it kind of hacker and IT-pro community?

@lrvick
Copy link

lrvick commented May 17, 2016

Huge +1 on this. It is the primary blocker for rolling out Nitrokeys instead of Yubikeys in my organization.

@aharonh
Copy link

aharonh commented Feb 4, 2018

+1 for this from here as well. What would otherwise prevent malicious software from using my keys without my intention? Taking the key in-and-out each time makes the probability to loose the key significantly higher, and as there is no implementation of internal key-duplication to another stick (as far as I understand) that puts the credentials/data/money in real danger. I'd be glad to learn that I am missing something in the work-flow with the key that disproves the point above.
Also, is there any advancement in this field in the 2 years that have passed since the question was raised?

@breznak
Copy link
Author

breznak commented Feb 6, 2018

Was it kind of hacker and IT-pro community?

Both hacker/privacy people, but importantly also corporate

@mfp20
Copy link

mfp20 commented Feb 18, 2020

Same issue here: I'd prefer Nitrokey becouse of its strong OSS commitment ... but find it useless without a button independent from the host. In my case I'd like to have it connected to my desktop keyboard's usb port, so to have it handy each time I need to use it; and have to unplug only when my (usually day-long) session ends.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants