I got a Rasperry Pi Pico 2 delievered recently, and I've spent today playing around with the #Picokeys project.
Specifically, I put both pico-hsm and pico-fido on it to play around with, and it's a really cool project. Back in the Pico 1 days it wasn't really any more secure than a software HSM, but the #RP2350 has enough security features that its actually interesting as a security project.
I wouldn't use it for anything serious at this stage, the code is unaudited, and the Pico 2's recent hacking challenge (https://github.com/raspberrypi/rp2350_hacking_challenge) revealed ways of breaking the security that wont be fixed until there's another hardware revision. However, if I was building my #homelab CA at the moment, I'd probably use this, because a) its much cooler than using a Yubikey, b) and my homelab's threat model doesn't include people breaking in with electroncis tools to extract my CA keys :P
The bigger issue is that the documentation for the project is... poor. The guides to get up and running are fine, but the docs for using it as a HSM are full of outdated information, and its not clear which of the security discussions are talking about the RP2040, and which refer to the 2350. I wish I knew enough about cryptography to be able to help with the docs, but I just don't.
Once the new hardware stepping is out, and the docs are updated there's got to be some use for a HSM that cost under a tenner, even if its not as audited as the more expensive Hardware Security devices, but I'm not yet certain what they are.

2шт RP2350, буду самопальные FIDO ключи делать, если кому надо, то вот - 