The magic with FIDO security keys is the same public key encryption as nostr uses. Your private key is on the USB key and the server gets the public key. The private key never leaves the USB, the event signing happens on the key.
This way you need physical access to the key to get in. A password leak doesn't let some rando in Nigeria into your account. Account access is still susceptible to wrench attacks but that is a smaller attacker pool than anyone on the planet with internet.
One thing to keep in mind is a Yubikey is a one of a kind deal. Lose it and you are toast. The solution is, register 2 keys on you account. 1 key for use and 1 goes in your safe and treated as seriously as your seed.
An onlykey offers an encrypted backup feature that allows you to clone keys. So I register 1 and clone it both now work. Hardware passwords are nice too. The only downside is some services don't properly support FIDO auth, they scan to see if it is a yubikey and refuse to work with other brands.
Google forced employees to go to hardware key 2fa years ago and it saved them a fortune because accounts accessed by social engineering attacks went to 0. It isn't a guarantee, but limiting unauthorized access to wrench attacks really cuts down the number of successful attacks.
I'd be willing to DM for use case details but I don't want to layout a roadmap publicly of how I secure all my accounts.
TLDR, this is a big jump in preventing hackers from accessing your accounts and I highly recommend you get 2 and use them.
Sure DM anytime if you feel inclined. Can use non-nostr too, like simplex.
Appreciate the answer, very informative. I always equated 2FA auth apps with the hardware RSA (?) token things workplaces would sometimes give (just less secure due to being digital versions). This felt equal in security but I guess it comes down to my lack of understanding of the cryptography employed between the two methods. Sorry if I botched the summary, figured I'd summarize in case I missed something.
The private key for this instance appears to just be digital thing stored with iCloud/keychain, so wasn't clear what possible advantage there was.
Those rolling number things are similar concept but slightly worse security in my opinion. They are called TOTP. These days very few use a token, most use an app to generate the numbers.
The reason I think they are worse is the secret now lives in that app which is usually running on an always internet connected device. The FIDO USB keys the secret is generated on the key and never leaves the key, the key signs the event.
Gonna have to go back and reread, and maybe google a couple things. But I think I've more or less got it.
Thread collapsed
Thread collapsed
Thread collapsed