How Do Security Keys Work? Explanation of Yubico Key Wrapping!

  Рет қаралды 1,516

CyberMedics

CyberMedics

Күн бұрын

Пікірлер: 20
@DonutAgain
@DonutAgain Жыл бұрын
This is nice… I saw several videos with titles like “how yubikey works”, but never mentioned how it works. They just demonstrate how it is used which is more like “how to use yubikey”. Your video is the first one I found explaining how it works.
@CyberMedics
@CyberMedics Жыл бұрын
Thanks for the nice feedback. It take a little more work, but we try to thoroughly explain everything. Unfortunately the video only has 800 views. Could we ask a favor? Would you please consider sharing this out with friends & coworkers? We believe this video is important for everyone to understand why the security of these keys are useful. Thank you!
@SteveEarly-jn6kp
@SteveEarly-jn6kp Жыл бұрын
Thank You for the video! question I bought 2 Yubico keys and used them to secure my Apple ID on my Mac Pro and I phone, does that automatically Locke my Apple ID on my iPad Pro or do I need to use yubi keys for the I pad also. Thanks for your help!!
@CyberMedics
@CyberMedics Жыл бұрын
When you add a security key to your apple device you are actually adding it to your apple ID. When the keys are first added you will be presented with 1 of 2 options: 1) add the key to all other devices (or else they will be signed out of the account or 2) Remove older devices that are not compatible with the HW security key. Please see our video: kzbin.info/www/bejne/ZqfOo6t5eNJrfNk Appreciate the comments and great questions! Thanks for subscribing!
@CyberMedics
@CyberMedics Жыл бұрын
Did you enjoy the video? It take a little more work, but we try to thoroughly explain everything. Unfortunately the video only has 800 views. Could we ask a favor? Would you please consider sharing this out with friends & coworkers? We believe this video is important for everyone to understand why the security of these keys are useful. Thank you!
@notreallyme425
@notreallyme425 Жыл бұрын
So a Yubikey can be used on an unlimited number of sites using FIDO, but only 25 that use FIDO2?
@CyberMedics
@CyberMedics Жыл бұрын
You are correct. Unlimited for FIDO U2F. 25 for FIDO2.
@CyberMedics
@CyberMedics Жыл бұрын
Do you us a hardware security key? If so, what brand of key do you use?
@SteveEarly-jn6kp
@SteveEarly-jn6kp Жыл бұрын
hi could you do a video on setting up yubi keys with I password please! thanks
@CyberMedics
@CyberMedics Жыл бұрын
We will put it in the que (1password.com/). I think 1passowrd is a 1st rate service.
@Creepyshortstale
@Creepyshortstale Жыл бұрын
Yahoo alright 👍👍
@CyberMedics
@CyberMedics Жыл бұрын
Did you enjoy the video. If so, please share the content with your friends & coworkers. Thank you!
@SteveEarly-jn6kp
@SteveEarly-jn6kp Жыл бұрын
Thank You!!
@rshnthms
@rshnthms Жыл бұрын
How can private_key encrypt challenge Both RSA and EC private_key can't perform this action, which is that algorithm is used?
@rshnthms
@rshnthms Жыл бұрын
@CyberMedics but if public_key encrypts the challenge and sends it to relaying party, then any1 can intercept and transmission getting public_key so they can impersonate the actual user, I thinks it private_key signed the challenge (which rsa and ec can do) and send the public_key and signed challenge to rp Please confirm, I am also confused ATECC608[A or B] might be used
@CyberMedics
@CyberMedics Жыл бұрын
It is hard to keep this all straight. Apologize that my previous answer was wrong/incomplete. I deleted my previous comment so as not to confuse others. I have confirmed the information in the video & provided some links below. Private Key Encrypts the challenge auth0.com/blog/what-is-a-yubikey-and-how-to-set-it-up-with-auth0/ HMAC SHA1 algorithm docs.yubico.com/hardware/yubikey/yk-5/tech-manual/yk5-apps.html#hmac-sha1-challenge-response Please let us know you received this update.
@LionRoars918
@LionRoars918 Жыл бұрын
Use a Yubikey. But no big deal. My bank uses 8-12 number password only, no 2fa. There is lots of work to do. Even Amazon does not do security keys here.
@CyberMedics
@CyberMedics Жыл бұрын
Thanks for commenting and subscribing. We use yibikey, authentrend, and feitian.
@Cbandzzzzzzzzzzzxzzxz
@Cbandzzzzzzzzzzzxzzxz Жыл бұрын
Can you recover my gmail
@CyberMedics
@CyberMedics Жыл бұрын
Account recovery is the only way to recover an account. Do you know the password?
How Security Keys work (2FA explained!)
17:42
Naomi Brockwell TV
Рет қаралды 164 М.
What is a Passkey?
18:05
Ask Leo!
Рет қаралды 104 М.
СИНИЙ ИНЕЙ УЖЕ ВЫШЕЛ!❄️
01:01
DO$HIK
Рет қаралды 3,3 МЛН
Каха и дочка
00:28
К-Media
Рет қаралды 3,4 МЛН
REAL or FAKE? #beatbox #tiktok
01:03
BeatboxJCOP
Рет қаралды 18 МЛН
How Does a Hardware Security Key Like YubiKey Work?
11:17
Ask Leo!
Рет қаралды 45 М.
Using FIDO U2F Two Factor Authentication with Yubi Key
10:41
The CryptoDad
Рет қаралды 23 М.
How To Use A Yubikey - Easy Guide For New Users
15:08
MrTimTech
Рет қаралды 11 М.
Eucleak: Is Your Yubikey Still Secure?
4:13
Lawrence Systems
Рет қаралды 34 М.
Cybersecurity Trends for 2025 and Beyond
16:55
IBM Technology
Рет қаралды 113 М.
How FIDO2 Works And Would It Stop MFA Fatigue Attacks?
10:14
Lawrence Systems
Рет қаралды 98 М.
What does this button do? Demystifying the Yubikey!
22:21
Dojo with Renan
Рет қаралды 22 М.
4 CRITICAL Places to Use a YubiKey (beyond an email account)
13:08
All Things Secured
Рет қаралды 120 М.