[Explained] Using Yubikey as a Secure Password Generator

preview_player
Показать описание
In part #2, I'll show how to use the Yubikey as a secure password generator.

The Yubico Yubikey personlization tool allows you to configure a static password within the key.

Using the static password you can create secure passwords.

#TheHiTechNomad #Yubikey #Lastpass

* * *
Disclosure: Please note that some of the links above are affiliate links, and at no additional cost to you, I will earn a commission if you decide to make a purchase after clicking through the link. Please understand that I have experienced all of these companies, and I recommend them because they are helpful and useful, not because of the small commissions I make if you decide to buy something through my links. Please do not spend any money on these products unless you feel you need them or that they will help you achieve your goals.
* * *

Need more of The Hi Tech Nomad, check out my podcast!

* * *

Ways to support this channel:

By shopping at our Amazon Powered Store :

▸ Instagram: TheHiTechNomad

Help support this channel:

Send packages and mail to:

1 Beacon Street, 15th Floor, Boston, Mass. 02108 USA

* * *
Рекомендации по теме
Комментарии
Автор

Thank you very much for making part 2. Keep producing as much information as possible please!

fluff
Автор

Excellent job covering some of the features of the Yubikey. Keep them coming!

rogerosbu
Автор

that small ad made me laugh lmao, your personal one. Haven't seen that ever before, very creative.

sovashadow
Автор

Dude your video production is so sick. Keep up the great work!

chrisr
Автор

Thanks for the video, very informative. I will be changing my passwords using Youbikey and last pass. Keep producing the videos

RegusPitts
Автор

This is a great video, those thunderbirds posters, class act.

betterrobots
Автор

Love the intro with the scifi stuff.. Outstanding

jimsmith
Автор

Very informative and entertaining! Thank you!

josephknight
Автор

As someone with a cryptographic mindset: A major issue with this method when you use this method on multiple sites...say some of those passwords are leaked, an attacker will be able to figure out that a weak variable string(unknown) + long static string(now known - relied on for security) is being used for each site password.

So essentially at this point it will be equivalent to the attacker only having to crack that very simple variable string for subsequent sites(equivalent to a extremely weak password)...modern software and hardware will break any passwords generated in this way within a matter of minutes or worst even seconds(if using a dictionary attack method as opposed to brute force)...

You are *FAR* better using that single random string by itself as the password for an actual password manager database, as opposed for individual site passwords that are leaked constantly.

Chris
Автор

just bought my yubikey thank you so much for the info!! really appreciate it

danc
Автор

Nice! this is a great way to calculate good password padding. But if you were being attached and a bad actor found your pad through a few breaches, you are much more open to bruit force. In your examples you are using short (4-5 character alpha only) passwords + the pad. once the pad is know breaking these is just to easy. As such if there are breaches you really need to update all passwords, due to the shared pad. (OK we can drop the paranoia now... 🙂) But if also using a UbiKey for 2FA then really should be all good. I like this a way to make my bit warden master password even stronger.

CharlesGauthier
Автор

Great channel and great info. Glad iI found this site

Ronald-rlhx
Автор

Hey sir, question. Slot 1 is yubi OTP so I was wondering if I could use that slot for a second static password. I already have the keys as a 2 factor for google and I was wondering if I use that first slot for a second static password would it write over the google 2 factor? Your info is amazing. This is the best way possible to keep everything secure.

Tadr
Автор

just found you. great info on setting up yubikeys for internet passwords. i'm heading off to your playlist to see the whole series. maybe you covered this elsewhere in the series, but in case you didn't, i'm curious as to why you decided to choose the 16 chars option over the 32 chars since 32 chars + whatever we give for a website's password would be much harder to crack than the 16 chars + whatever we add?

ee
Автор

Great video, but in the future when you make a multi-part series (which is a great idea, btw). Try linking the other videos in the description.
ie: If you linked videos 1, 3 and 4 of this security series in the description. It would make it a lot easier for me to watch all 4 videos back to back without wasting time searching for the others. Your view count on each video would go up and isn’t that the goal on YouTube, to maximize the view count per video.

Other then that great video, keep them coming.

edsmith
Автор

Cara muito bom quem precisa de LastPass hahahaha

alexsander
Автор

Thanks for the videos. I just watched part one, and about to start part 2. Curiously, why did you choose to stick with lastpass? I read 1password is a little more rugged and secure.


I'd appreciate your thoughts! Thanks

gregoryesman
Автор

That's how I use my LastPass. The passwords that are stored in the vault have missing characters. I would add the missing characters when asked to input my password. So, I'm not worried if LastPass would get hacked since I only stored the password partially. BTW I'm using LastPass with Yubikey.

manny
Автор

What if someone else knows my backup secret key for 2FA authentication, would they be able to access my codes romotely even when I'm using a yubikey to generate codes?

crypto-daily
Автор

Awesome that you explained this in such excellent detail. Terrible that you have to make so many workarounds to get there.

TomHarrisonJr