pull down to refresh

So I'm at the Bitcoin conference, right? Guy next to me has this fancy Yubikey hanging from his lanyard like it's some kind of security holy grail. "Yo, you NEED one of these. Hardware security, can't be hacked, best thing ever."
Cool. I order one. 55€ later, it arrives.
Set it up for PGP. Follow all the tutorials. Move my subkeys onto it. Feel like a proper cypherpunk for about 5 minutes.
Then I try to certify someone's public key.
"Error: Cannot certify with subkey."
Wait, what?
Turns out the stupid thing can't actually certify keys. Only holds 3 subkeys anyway - sign, encrypt, authenticate. That's it. Want to certify someone's identity? Need your master key. Which obviously shouldn't be on the Yubikey because that defeats the entire point of keeping it offline.
So now I have this workflow:
  • Boot Tails from USB for anything important (certifying keys, managing web of trust)
  • Use Yubikey for... signing emails I guess?
The kicker? Still need to type a PIN every time I use the damn thing. So much for "convenient."
Don't get me wrong - it's not completely useless. Nice for traveling, protects the subkeys, whatever. But all those YouTube tutorials making it sound like the ultimate security solution? Yeah, no.
My airgapped Tails setup still does the heavy lifting. The Yubikey is just an expensive way to avoid typing gpg --sign with a local key.
Hardware can't fix stupid OpSec. Who knew?
Still keeping it though. Looks cool on the keychain. Maybe one day I'll find a proper use case that isn't just security theater.
111 sats \ 0 replies \ @kepford 15h
I think Yubikeys are great but I don't use them for anything related to bitcoin. As a second factor (something you have) with something you know they do a lot for security if used as they are designed.
I could be wrong but I am not aware of the company marketing them as useful in the way you describe. On top of that there are tons of people giving bad advise online. Sounds like you learned a lesson which really is worth the money spent. I've learned many lessons this way. Too many to name really.
reply
It should be usable for things beyond PGP, like FIDO/WebAuthn?
reply
11 sats \ 1 reply \ @kepford 16h
They admitted as much later in the post. You are correct.
0 sats \ 0 replies \ @atori 3h
You could also not use subkeys and put your master key in there so you can certify other people's keys.
reply
stackers have outlawed this. turn on wild west mode in your /settings to see outlawed content.