So, I lost another hardware key since discussing it not even two weeks ago.
From that chat, the main value of having a hardware key is that they are in theory supposed to only be connected to a single device, which makes them less accessible across services but I constantly lose them or at the very least just forget to bring them along which is a pain, plus, they aren’t cheap and I get it…for good reason. I’ve always known this would be an issue, so I always buy extras and then go through the work of registering them across all the stuff I did with the old key.
Given the inherent issue that tends to pop up with me and likely many other humans with “keeping track of small items” issues, what would you all recommend?
My setup:
I’ve used hardware keys as both 2FA and to lock my KeepassXC which is replicated with my vault in cloud storage. I really like Aegis TOTP so in theory, I don’t mind reverting back to an authenticator app for 2FA. My real reason that I liked the hardware key was kind the master password that couldn’t be as easily leaked or replicated…but it’s strength is also it’s weakness for users like me.
If I remove the hardware key an attacker got access to my vault and my master password, they could crack it open with their local KeepassXC, Aegis, etc…
The support for biometrics in KeePassXC has been merged and will be available in 2.8.0 which could provide some other layer of protection to the vault itself, but some suggest that biometrics aren’t necessarily trustworthy.
I’m pretty good at keeping my phone with me, I think the primary issue is that the key is small. Here’s a few thoughts I’ve had:
- Connect my key to my phone
- Biometrics + Passkey to replace hardware key
- 2 USB + Passkey and I really really promise to not copy it more than once. If I lose the usb, I have the backup to unlock stuff and update the password and buy new usb to hold the key.
- Programmable microchip in my skin + Passkey for extra dystopian vibes
Any other ideas or which of these seem least risky? Maybe someone has a “5 security key alternatives that Yubico doesn’t want you to know about”?
I want to assume a higher threat model to be in practice rather than having to learn as I go. Also, if I ever wanted to enter into hacktivism/journalistic side of things, or were to advise someone in this realm, then I would be well practiced if the situation becomes apparent that I need to operate at that higher model. Plus I find it strangely fun.