<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: danstiner</title><link>https://news.ycombinator.com/user?id=danstiner</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 04:02:23 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=danstiner" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by danstiner in "I want an iPhone Mini-sized Android phone"]]></title><description><![CDATA[
<p>market of three<p>The litephone is too basic and the HiSense A5 etc do not work on US networks.<p>I looked at building a 5.2" e-ink phone for the US market and did some fun mock-ups, but it would be a huge undertaking with my limited hardware background. Smaller phones just have fundamental limits due to battery size that are difficult to work around, and Android has basically no e-ink support as it's such a niche type of display for a phone.</p>
]]></description><pubDate>Tue, 17 May 2022 17:27:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=31413816</link><dc:creator>danstiner</dc:creator><comments>https://news.ycombinator.com/item?id=31413816</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31413816</guid></item><item><title><![CDATA[New comment by danstiner in "Apple, Google, and Microsoft commit to expanded support for FIDO standard"]]></title><description><![CDATA[
<p>Yes that's fair, it's a trade-off. Thinking more, there are really three levels of protection I see.<p>1. Keep keys in a file/the keyring. This protects them somewhat from non-root users on the same machine. It also provides phishing protection, which is really the most important aspect of U2F/WebAuthn to most people. If your computer is compromised, all the keys are compromised.<p>2. Keep keys in the TPM. The only additional protection over #1 is if you recover your computer after it is compromised, you can be reasonably certain the attacker could not make a copy of the keys and thus can no longer use them to authenticate. Arguably this is not a particularly useful protection.<p>3. Keep keys in the TPM/secure enclave and unlock them via biometric. This does provide meaningful extra protection if every use requires an unlock. Then if your computer is compromised, the attacker will have to either defeat the biometric unlock, or trick you into unlocking for every authentication attempt.<p>#1 is what I do right now for rust-u2f, and I think you're right #2 is not really useful. So maybe it's worth just implementing FIDO2 without worrying about TPM support. What I really was talking about was doing #3 for Linux, but I don't see a way to meaningfully accomplish it without tight hardware integration.<p>P.S. It is recommend to register multiple FIDO keys and/or have backup codes for accounts as a way to mitigate the issue of one physical device breaking toasting an identity. Not all providers may support this, for silly reasons.</p>
]]></description><pubDate>Tue, 10 May 2022 17:36:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=31329896</link><dc:creator>danstiner</dc:creator><comments>https://news.ycombinator.com/item?id=31329896</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31329896</guid></item><item><title><![CDATA[New comment by danstiner in "Apple, Google, and Microsoft commit to expanded support for FIDO standard"]]></title><description><![CDATA[
<p>I've considered adding FIDO2 support to the software-only U2F token I wrote in Rust. It's a fair bit of work though, and I am not sure how comfortable I am with passwordless login unless the keys are kept purely in hardware such as a TPM.<p>That said, my reading of this post is that FIDO2 support will get built into Chromium directly, which is itself open source. Or if you do want a hardware key but running open software, I'd definitely recommend <a href="https://solokeys.com/" rel="nofollow">https://solokeys.com/</a>, I've been following them for a long time.<p>Also there was some related discussion on this same article last week: <a href="https://news.ycombinator.com/item?id=31274677" rel="nofollow">https://news.ycombinator.com/item?id=31274677</a><p>edit: I see someone already pointed you to my project earlier, feel free to poke around and I'm also open to contributions!</p>
]]></description><pubDate>Tue, 10 May 2022 16:25:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=31328975</link><dc:creator>danstiner</dc:creator><comments>https://news.ycombinator.com/item?id=31328975</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31328975</guid></item><item><title><![CDATA[New comment by danstiner in "Apple, Google and Microsoft Commit to Expanded Support for FIDO Standard"]]></title><description><![CDATA[
<p>Yep exactly, Krypton looked interesting, sorry to see it's dead.<p>And yep Apple is way ahead on this imo, the touch sensor securely communicates with the Secure Enclave, I'm not aware of other laptop hardware doing that. (<a href="https://support.apple.com/en-bh/guide/security/sec067eb0c9e/1/web/1" rel="nofollow">https://support.apple.com/en-bh/guide/security/sec067eb0c9e/...</a>)<p>I'd love to have something equivalent for Linux, but given that requires hardware support I think relaying auth requests to your phone is the closest equivalent.</p>
]]></description><pubDate>Tue, 10 May 2022 16:10:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=31328801</link><dc:creator>danstiner</dc:creator><comments>https://news.ycombinator.com/item?id=31328801</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31328801</guid></item><item><title><![CDATA[New comment by danstiner in "Apple, Google and Microsoft Commit to Expanded Support for FIDO Standard"]]></title><description><![CDATA[
<p>Thanks for the shout-out!<p>I wrote that U2F implementation in software because I wanted phishing protection without needing to carry a hardware key.  Well, and to learn Rust :) It's certainly a security trade-off to just store secrets in your keychain like I choose to, it is not meant to be a replacement for a hardware key and in fact I have a Yubikey I use when the situation calls for it.<p>I'd love to use TPM and biometrics to implement U2F/WebAuthn on Linux and have a proper, secure solution. Similar to what Apple has done with Touch ID. But that's no easy task. TPM support is poor on Linux and other options like relaying auth requests to your phone for approval and storing secrets in the Secure Enclave is no easier.</p>
]]></description><pubDate>Thu, 05 May 2022 18:14:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=31276738</link><dc:creator>danstiner</dc:creator><comments>https://news.ycombinator.com/item?id=31276738</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31276738</guid></item><item><title><![CDATA[New comment by danstiner in "Software U2F Authenticator for macOS"]]></title><description><![CDATA[
<p>I would too. Go ahead and open an issue and we can chat more, but in short I think the biggest hurdle is understanding TPM2 and what API to use to interact with the device. (TPM2 is necessary so the key material never leaves the TPM, signing  happens in the device itself)</p>
]]></description><pubDate>Fri, 06 Sep 2019 15:55:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=20896780</link><dc:creator>danstiner</dc:creator><comments>https://news.ycombinator.com/item?id=20896780</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20896780</guid></item><item><title><![CDATA[New comment by danstiner in "Software U2F Authenticator for macOS"]]></title><description><![CDATA[
<p>It definitely also supports Firefox, updated the README.<p>I'm just emulating a USB device and using OpenSSL to do the signing, is there a better approach I should be looking at? (perhaps PKCS #11)</p>
]]></description><pubDate>Fri, 06 Sep 2019 15:34:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=20896547</link><dc:creator>danstiner</dc:creator><comments>https://news.ycombinator.com/item?id=20896547</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20896547</guid></item><item><title><![CDATA[New comment by danstiner in "Software U2F Authenticator for macOS"]]></title><description><![CDATA[
<p>Thanks for the suggestion. It hasn't been a focus yet because it doesn't bring much security for me personally, but it is something I would like to do eventually.<p>Issue: <a href="https://github.com/danstiner/rust-u2f/issues/19" rel="nofollow">https://github.com/danstiner/rust-u2f/issues/19</a></p>
]]></description><pubDate>Fri, 06 Sep 2019 15:30:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=20896516</link><dc:creator>danstiner</dc:creator><comments>https://news.ycombinator.com/item?id=20896516</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20896516</guid></item><item><title><![CDATA[New comment by danstiner in "Software U2F Authenticator for macOS"]]></title><description><![CDATA[
<p>Shameless self-plug, I've written such an equivalent for Linux distros: <a href="https://github.com/danstiner/rust-u2f#rust-u2f" rel="nofollow">https://github.com/danstiner/rust-u2f#rust-u2f</a><p>Though it suffers from the caveat that secrets are just stored as a file in $HOME. I'd love to support more secure methods but haven't seen enough interest in the project to justify the dev time that would be required.</p>
]]></description><pubDate>Thu, 05 Sep 2019 22:15:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=20891125</link><dc:creator>danstiner</dc:creator><comments>https://news.ycombinator.com/item?id=20891125</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20891125</guid></item></channel></rss>