nobody:

absolutely nobody:

yubikey: cccjgjgkhcbbcvchfkfhiiuunbtnvgihdfiktncvlhck

@bcrypt eifjccgcknuvdbbedihbgdtgdubuthcvthuujeeuffrr
@bcrypt I think I have a yubikey from a Wired subscription. Never used it, never needed it. The yubi, not the Wired sub.
@bcrypt 😱 the mouth on that thing!
@bcrypt i regret getting the smol capacitative one for my macbook, conteplate getting an extension cord to get it out of reach.
@bcrypt One of my yubikeys is permanently inserted into USB port in my monitor. It's also at just the right height that my cat randomly triggers it while grooming.
@bcrypt yubikeys were the original bottom-speakers
@bcrypt LOL. Classic yubikey! 😂

@bcrypt I always set yubico OTP to the long press slot to prevent this and slot 1 to hmac

But yeah.. it happens

@bcrypt And it always happens in chat messages too!
@bcrypt And that's how AWS S3 buckets get their new names
@bcrypt luckily you can disable it AFAIR
@bcrypt which leaks your YubiKey serial number. a very strong signal. https://ssg.github.io/yubitell/
yubitell - identify a yubikey

@bcrypt and why is it always with a document I’ve just created the shares link to so everyone then can comment on it??
GitHub - pallotron/yubiswitch: OSX status bar application to enable/disable Yubikey Nano

OSX status bar application to enable/disable Yubikey Nano - GitHub - pallotron/yubiswitch: OSX status bar application to enable/disable Yubikey Nano

GitHub

@bcrypt

I just got my first yubikey and this is so true 😂

@bcrypt I had this happen way too many times when I accidentally pressed my yubikey or was fidgeting or fiddling around with it. Finally disabled it like a week ago with Yubikey Manager.
@bcrypt i always just thought these were funny until I found out they were dangerous https://xeiaso.net/blog/push-2fa-considered-harmful
Push notification two-factor auth considered harmful

Push notification two-factor auth considered harmful - Xe's Blog

Xe's Blog
@glyph @bcrypt TLDR:
“Unlike SMS or email OTPs, which typically expire after a short period, Yubikey OTPs are valid until they, or a later generated code, are used for authentication. Until then, your authentication is vulnerable to a buffered replay attack”
(I’d forgotten this!)
@bcrypt Here, @cibomahto this thread is for you
@bcrypt In the #Dvorak layout, that would be: jjjhihitdjxxjkjdutudccggbxybkicdeuctybjkndjt
@bcrypt I only use it for WebAuthn, Yubi OTP etc. are unusable for me, doubly due to the limit of OTPs I can store
@bcrypt Legacy Yubikey OTP needs to be allowed to die, and it should have been disabled by default long ago.