social.anoxinon.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Die offizielle Mastodon Instanz des Vereins Anoxinon e.V.

Serverstatistik:

1,1 Tsd.
aktive Profile

#solokey

0 Beiträge0 Beteiligte0 Beiträge heute

For some reason I've so far been completely unable to use my #SoloKey over NFC on my phone (#Pixel 8 Pro running #GrapheneOS). The YubiKey NEO works fine for #U2F if I have #Bitwarden autofill disabled, but scanning the SoloKey always just brings up the SoloKey web page. Doesn't work for #passkeys either.

The SoloKey also only works for U2F on my laptop, because I use LibreWolf, and Mozilla is too busy wasting their time on AI to implement security features like PRF.

TIL: es gibt tatsächlich Banken die #FIDO2 unterstützen :blobaww:

Na @glsbank, wann kann ich meinen #YubiKey / #SoloKey bei euch als zweiten Faktor verwenden? :blobcatcoffee:

marchfelderbank.at/internetban

FIDO2 ist ein Multi-Factor-Authentication (#MFA) Standard, welcher auch Password-less Authentication erlaubt. Da es ein offener Standard ist kann eine Vielzahl von Lösungen damit als zusätzlicher Faktor statt klassicher TANs eingesetzt werden.

it-finanzmagazin.de/fido-banke

https://www.marchfelderbank.atFIDO2-TOKEN | Marchfelder BankFido2-Token - ein weiterer Schritt zum einfachen Login ins Marchfelder Internet Banking.

Nachdem wir nun seit #LetsEncrypt das Internet nahezu vollständig mit Zertifikaten und rudimentären verschlüsselten Verbindungen ausgestattet haben, ist die nächste wichtige Technologie meiner Meinung nach, die flächendeckende Nutzung von Hardware Tokens und Passwort Managern. Spendet doch Mal euren Lieblingsadmin ein #Yubikey, #SoloKey oder #Nitrokey. Denn die Sicherheit der privaten Infrastruktur eures Instanzbetreibers steht in dem direkten Zusammenhang mit euren Daten auf seinen Systemen. 🫡

Antwortete AnotherKiwiGuy

@nick @torproject @briar
My bad- I haven't had my coffee yet and misunderstood.

As I still wake up, speaking from a pinephone user perspective:::
- A fully #encrypted #filesystem, with optional support for hardware key (like #solokey, or #nitrokey) #decryption
++Not sure about hw key, but encrypted fs is relatively easy on most Linux distros
- NO #Fingerprint Scanner or #Biometrics at all
++#pinephone doesn't have that at all
- #NFC that can only be toggled on temporarily, and automatically shuts off after X amount of time
++Probably a feature to be released in the near future
- #Bluetooth 5+ with #A2DP; #AptX and #BLE with a more security focused method of #authentication
++From the wiki "Bluetooth: 4.0, A2DP"; could probably swap it out though.
- All internet connections routed through @torproject (or something similar), with a #killswitch if the connection is dropped
++Maybe configure a distro to do so? I know there's various killswitches on the back.
- Privacy focused #browser with something like #SSL Everywhere; #WebRTC and JS disabled by default, with easy toggle for "trusted" websites, which would allow JS and Video etc
++Never tried this specific setup myself-ill have to give it a go.
- #Decentralized messaging; voice chat; video conferencing; forums and blogs, like where #Briar is being taken by @briar (though the voice; video and other creature comforts are as yet unavailable)
++I used #fractal as well as ssh into my personal communication server
- No closed source Modem/Wifi/Bluetooth binary blobs
++Iirc, pinephones modem is open.
- Securely Containerized SMS/MMS
++Sms/mms is still unstable but working
- Password Manager with support for #OTP; #TOTP and #Fido2
++I keep being referred to bitwarden. Not sure if this applies.
- #GPS #Spoofing by default
++Not aware of any mobile distro doing this be default
=======≠===≠=≠================≠===≠===≠==
I would like to see more Linux phone options/development out there in the wild...

I was thinking about my post about a week ago, re. the #FreedomPhone (see the link below).

It got me wondering - What would I actually want in a #Freedom and #Privacy respecting #phone?

Maybe things like:

- A fully #encrypted #filesystem, with optional support for hardware key (like #solokey, or #nitrokey) #decryption
- NO #Fingerprint Scanner or #Biometrics at all
- #NFC that can only be toggled on temporarily, and automatically shuts off after X amount of time
- #Bluetooth 5+ with #A2DP; #AptX and #BLE with a more security focused method of #authentication
- All internet connections routed through @torproject (or something similar), with a #killswitch if the connection is dropped
- Privacy focused #browser with something like #SSL Everywhere; #WebRTC and JS disabled by default, with easy toggle for "trusted" websites, which would allow JS and Video etc
- #Decentralized messaging; voice chat; video conferencing; forums and blogs, like where #Briar is being taken by @briar (though the voice; video and other creature comforts are as yet unavailable)
- No closed source Modem/Wifi/Bluetooth binary blobs
- Securely Containerized SMS/MMS
- Password Manager with support for #OTP; #TOTP and #Fido2
- #GPS #Spoofing by default

That's all I can think of for now, what would YOU like to see in a Privacy focused Phone?

https://social.kaitaia.life/notice/A9OiFyZ1Sd0YXjd200