diff options
author | drduh <github@duh.to> | 2019-09-25 16:37:39 +0000 |
---|---|---|
committer | GitHub <noreply@github.com> | 2019-09-25 16:37:39 +0000 |
commit | 2d3c41fdba370f62d1e7f747816bb7b3f5fb4465 (patch) | |
tree | 4571e81e297ca840e5b0fb312c8bcf074009f703 /README.md | |
parent | Merge pull request #126 from vorburger/patch-2 (diff) | |
parent | Update README.md (diff) | |
download | YubiKey-Guide-2d3c41fdba370f62d1e7f747816bb7b3f5fb4465.tar.gz |
Merge pull request #130 from johnsoga/johnsoga-sources
Update README.md
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -1,6 +1,6 @@ This is a guide to using [YubiKey](https://www.yubico.com/products/yubikey-hardware/) as a [SmartCard](https://security.stackexchange.com/questions/38924/how-does-storing-gpg-ssh-private-keys-on-smart-cards-compare-to-plain-usb-drives) for storing GPG encryption, signing and authentication keys, which can also be used for SSH. Many of the principles in this document are applicable to other smart card devices. -Keys stored on YubiKey are non-exportable (as opposed to file-based keys that are stored on disk) and are convenient for everyday use. Instead of having to remember and enter passphrases to unlock SSH/GPG keys, YubiKey needs only a physical touch after being unlocked with a PIN code. All signing and encryption operations happen on the card, rather than in OS memory. +Keys stored on YubiKey are [non-exportable](https://support.yubico.com/support/solutions/articles/15000010242-can-i-duplicate-or-back-up-a-yubikey-) (as opposed to file-based keys that are stored on disk) and are convenient for everyday use. Instead of having to remember and enter passphrases to unlock SSH/GPG keys, YubiKey needs only a physical touch after being unlocked with a PIN code. All signing and encryption operations happen on the card, rather than in OS memory. **New!** [drduh/Purse](https://github.com/drduh/Purse) is a password manager which uses GPG and YubiKey. |