Finally, you can use the your soloKey or other U2F key with openSSH. It is still very early support so you will have to do a bit of compiling yourself. Here’s how!
Nov
Finally, you can use the your soloKey or other U2F key with openSSH. It is still very early support so you will have to do a bit of compiling yourself. Here’s how!
Oct
An fantastic interview with Edward Snowden for the Joe Rogan show. Almost 3 hours about the mass-surveillance going on in this world.
Oct
Who would have known that a fun project (originating from a computer game idea) would end up 50 years later as being the ground work for most modern operating systems? Happy Birthday to UNIX 50 years.
Aug
Sometimes a hardware key is not for added security but simply for added simplicity. This time I give a quick intro to how you can use a SoloKey (or other U2F/FIDO2 HW key) as a quick Linux login mechanism.
Aug
If you want to have extra security for your linux machine besides the usual password. Then get yourself a SoloKey or other hardware U2F key and use that as secondary login. Here I give you the description on how to install and configure everything for using Solokeys with your linux. Enjoy!
Aug
I spend a lot of my time on IT security and related subjects. This is also why you will always find at least 1-2 hardware security keys on me when I move around. This time I tell a bit about the three types I primarily use.
Aug
Sometimes you need a lot of storage in the cloud and services like dropbox and google drive just don’t give you enough space (unless you pay a lot of money each month). I have been looking a bit at the 1TB+ cloud services and found my favorite among them.
Jun
Many C-programmers do not realize that fun() != fun(void) unless they have a C++ background.
Nov
What should you do when you have 50+ buffers open in Vim? This is my trick.
Oct
A little story about broken computer systems and how even big diamond companies don’t seem to care about security.