<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/rss-style.xsl" type="text/xsl"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	     xmlns:dc="http://purl.org/dc/elements/1.1/"
	   xmlns:atom="http://www.w3.org/2005/Atom"
	     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
<channel>
	<title>fido &#8211; Terence Eden’s Blog</title>
	<atom:link href="https://shkspr.mobi/blog/tag/fido/feed/" rel="self" type="application/rss+xml" />
	<link>https://shkspr.mobi/blog</link>
	<description>Regular nonsense about tech and its effects 🙃</description>
	<lastBuildDate>Sat, 24 Feb 2024 09:36:55 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://shkspr.mobi/blog/wp-content/uploads/2023/07/cropped-avatar-32x32.jpeg</url>
	<title>fido &#8211; Terence Eden’s Blog</title>
	<link>https://shkspr.mobi/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title><![CDATA[Giving the finger to MFA - a review of the Z1 Encrypter Ring from Cybernetic ★★★★☆]]></title>
		<link>https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/</link>
					<comments>https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Fri, 23 Feb 2024 12:34:17 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[2fa]]></category>
		<category><![CDATA[fido]]></category>
		<category><![CDATA[gadget]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[nfc]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[rfid]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=49592</guid>

					<description><![CDATA[I have mixed feelings about Multi-Factor Authentication. I get why it is necessary to rely on something which isn&#039;t a password but - let&#039;s be honest here - it is a pain juggling between SMS, TOTP apps, proprietary apps, and magic links.  I&#039;m also not a fan of PassKeys. It feels weird to me that my computer is the password. I get the theoretical way it works - but it rubs me up the wrong way.  So, …]]></description>
										<content:encoded><![CDATA[<p>I have mixed feelings about Multi-Factor Authentication. I get why it is necessary to rely on something which isn't a password but - let's be honest here - it is a pain juggling between SMS, TOTP apps, proprietary apps, and magic links.</p>

<p>I'm also not a fan of PassKeys<sup id="fnref:terminology"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#fn:terminology" class="footnote-ref" title="FIDO2? U2F? MFA? PassKeys? Some of these are technologies and some are marketing terms. In most cases it is transparent to the user. They type in their username and password, then they have to…" role="doc-noteref">0</a></sup>. It feels weird to me that my computer <em>is</em> the password. I get the theoretical way it works - but it rubs me up the wrong way.</p>

<p>So, Yubikeys? <a href="https://shkspr.mobi/blog/2017/11/a-grumpy-look-at-using-a-yubico-neo-nfc-on-ubuntu-android/">I find them an annoyance</a>. I never have my keys to hand - which sort of defeats the purpose of them.</p>

<p>A little while ago, I wondered "<a href="https://shkspr.mobi/blog/2022/02/where-are-the-u2f-rings/">Where are the U2F Rings?</a>" If I could have a <em>wearable</em> MFA token, that would solve many of my issues<sup id="fnref:issues"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#fn:issues" class="footnote-ref" title="Technical issues. Obviously my many personal issues remain load-bearing." role="doc-noteref">1</a></sup>.</p>

<p>Enter the <a href="https://getcybernetic.com/product/ring/">Cybernetic Z1 Encrypter Ring</a>. It is a US$300 zirconia ring with a built-in range of JavaCard-based NFC apps - including the ability to unlock your Tesla<sup id="fnref:tesla"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#fn:tesla" class="footnote-ref" title="I don't have a Tesla to test it on. And I'd rather keep it that way!" role="doc-noteref">2</a></sup>. It is powered by the <a href="https://vivokey.com/apex/">VivoKey Apex chip</a> (NXP JCOP 4 P71) which provides all the security and functionality. Your money also gets you an NFC reader/writer which connects to your computer via USB.  The team have sent me a demo version of the ring to review on the proviso that I give them feedback.</p>

<h2 id="demo"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#demo">Demo</a></h2>

<p>Here's a quick video showing how it works:</p>

<iframe title="Review: Cybernetic's Z1 Encrypter Ring - FIDO2, U2F, PassKey" width="560" height="315" src="https://tube.tchncs.de/videos/embed/84a5f19d-fe75-4b6a-baaa-970c9767d8c3" frameborder="0" allowfullscreen="" sandbox="allow-same-origin allow-scripts allow-popups"></iframe>

<h2 id="the-good"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#the-good">The Good</a></h2>

<p>It works! Seriously, in a world of vapourware and vaguely-worded Kickstarters, it is refreshing to have a product which actually delivers. I was able to enrol it on my BitWarden account and then use it to log in - all via my Android phone. Similarly, I tested it working with Amazon, BitWarden, CodeBerg, Discord, Gandi, GitLab, GoDaddy, Google, PorkBun, Proton, WordPress and a few others.</p>

<p>It's a good looking, plainly designed, unibody ring. It is waterproof and survived the daily abuse I give my hands.  It was washed with soap and blasted with a hand-dryer and it kept on chugging. No need to recharge it either - NFC runs off the power of radio waves like magic.</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/02/cybernetic-black-gloss-side-b-1.webp" alt="A plain black ring. What secrets does it contain within?" width="512" height="512" class="aligncenter size-full wp-image-49594">

<p>It is completely smooth, no built in scanners or LEDs or power-ports. The antenna appears to be all the way around the ring - so you can use either side of your finger on a scanner.</p>

<p>There is an <a href="https://play.google.com/store/apps/details?id=com.vivokey.apexmanager.cybernetic">Android app</a> which you can use to send information to the ring. That's designed for being able to share contact details and has a generous 4KB of storage<sup id="fnref:4kb"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#fn:4kb" class="footnote-ref" title="Not a typo. NFC is designed for low power and fairly low speed. Most commercial NFC tags have about 500 bytes of storage. The memory on this ring will let you share up to 32KB of data - if you remove…" role="doc-noteref">3</a></sup>.</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/02/Android-app-fs8.png" alt="Android app with various options greyed out." width="540" height="966" class="aligncenter size-full wp-image-49602">

<p>But, the nice thing is, <strong>you don't <em>need</em> the app!</strong> By default the ring will work as a FIDO2 token suitable for logging in to a variety of services.</p>

<p>The code on the Ring is (somewhat) Open Source. You can write your own JavaCard applets and load them on to the ring.</p>

<h2 id="the-bad"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#the-bad">The Bad</a></h2>

<p>It works well... until it doesn't. Mostly this is a criticism of FIDO2. I initially was unable to use the ring with GitHub:
<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/02/Something-Went-Wrong-fs8.png" alt="Android pop up saying &quot;Something went wrong&quot;." width="540" height="951" class="aligncenter size-full wp-image-49600">
I tried both Firefox and Chrome but got the same error.  Similarly, CoinBase wouldn't register the key and didn't tell me why.</p>

<p>I contacted the Ring's manufacturer and they sent me details of a <a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#updates">firmware update</a> which claimed to fixed the issue.</p>

<p>Google worked - but gave me this rather weird default name and icon:
<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/02/Google-Account-fs8.png" alt="Google account page showing an Apple logo and the name iCloud keychain." width="540" height="674" class="aligncenter size-full wp-image-49601">
I was able to rename it, but the icon can't be changed.</p>

<p>Amazon had the same issue, but with no way to rename.</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/02/Amazon-passkey-fs8.png" alt="Screenshot showing the Passkey has been added - but it is called iCloud Keychain." width="540" height="708" class="aligncenter size-full wp-image-49633">

<p>Both LinkedIn and WhatsApp would only let me create a phone-based PassKey. They didn't give me a prompt to scan my NFC ring.</p>

<p>NFC <em>only</em> is also a bit of a limitation. Until every laptop comes with built-in NFC, you'll need to use a dongle / reader if you want to use the ring.  For a phone or tablet with NFC, you're fine.  Well, as long as you know where your phone's NFC reader is!</p>

<p>The Android app isn't open source, which feels like a bit of a missed opportunity. It is pretty bare-bones, only providing the ability to add contact details and see how much free storage and RAM there is. In the future, the app promises to offer "Smart PGP" and a few other services.</p>

<p>The contact card stuff is a bit underwhelming. Rather than embed a VCARD, it takes users to a separate website which has your contact details on it.</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/02/Social-Network-fs8.png" alt="Screenshot of a website with a pixelated image of my face and some contact details." width="540" height="592" class="aligncenter size-full wp-image-49603">

<p>Weirdly, it zips the content of your contact details and uses them to populate the website with data. Because there's only a limited amount of space available, contact images end up very pixellated.  The website also uses external JavaScript without using SRI - which isn't what I'd expect from a security focussed company.</p>

<p>If you use a 3rd party NFC app, you can change the NDEF share to be <em>any</em> URl you want.  I think that's probably a sensible thing to do.</p>

<p>Obviously, $300 is a chunk of change. You can <a href="https://amzn.to/49rsPMT">buy a basic U2F USB/NFC <strong>key</strong> for £20 - £50</a>. So, with this, you're paying a higher price for a small-run product with a niche form-factor.</p>

<h2 id="the-ugly"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#the-ugly">The Ugly?</a></h2>

<p>Do you want to wear jewellery? The Z1 is plain black and unobtrusive - unlike the garish designs of some fashion rings - but perhaps a few different styles and colours would be nice?</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/02/Ring-height.jpg" alt="Photo of my fingers curled up so you can see the height of the ring." width="1024" height="1024" class="aligncenter size-full wp-image-49604">

<p>I already wear a wedding ring, so having another to wear wasn't too much of an adjustment.  The ring comes in a number of US ring sizes, so you may need to compensate if you're used to a different sizing system. However, it is a bit of a chunky beast. You will certainly notice it while wearing it.</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/02/Ring-width.jpg" alt="Photo of my fingers stretched out so you can see the width of the ring." width="1024" height="1024" class="aligncenter size-full wp-image-49605">

<p>Would an attacker rip it off your finger or even chop your finger off? It is a niche risk - but if you're using this to digitally safeguard your billions of crypto-riches, worth thinking about.</p>

<h2 id="updates"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#updates">Updates</a></h2>

<p>The Z1 Encrypter runs JavaCard applets so, in theory, you can load any compatible app onto it. By default, it runs <a href="https://github.com/BryanJacobs/FIDO2Applet">Bryan Jacobs' FIDO2Applet</a>.  It recently received <a href="https://github.com/BryanJacobs/FIDO2Applet/commit/1f406ec383f7b447c7752d4d35b2f3bbd3c079d3">an update</a> which should make it work with GitHub.</p>

<p>To install or update apps, you'll need the Fidesmo <a href="https://play.google.com/store/apps/details?id=com.fidesmo.sec.android">Android app</a> or <a href="https://apps.apple.com/us/app/fidesmo/id1504891446">iOS app</a>.</p>

<p><strong>WARNING!</strong> Before installing a new app, you have to destroy the old one. This will wipe <em>all</em> your previous registrations.</p>

<p>However, I just couldn't get this to work. I tried using the Fidesmo app to uninstall the Tesla applet - but it failed.</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/02/service-failed-uninstalling-fs8.png" alt="Screenshot of the Fidesmo app saying &quot;Service Failed Uninstalling&quot;." width="540" height="731" class="aligncenter size-full wp-image-49657">

<p>Despite it asking me to uninstall again, there was no option to do so.</p>

<p>I find it a bit weird that the Ring relies on a 3rd party app to do this. I'd much rather see it built into the same app which controls the ring.</p>

<h2 id="security"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#security">Security</a></h2>

<p>By default, the ring has no password set on its internal memory.  That means you can write whatever content you want to the NDEF share. Of course, this means someone sat next to you can <em>also</em> change your saved URl!  If you use the Fidesmo app, you can lock the contents of the share. Once locked it cannot be overwritten unless you destroy the applet.</p>

<p>So I was able to change the default URl to one I controlled, and I was able to lock it.</p>

<p>But <em>anyone</em> with the Fidesmo app can delete <em>any</em> applet on your ring. Simply open the app, tap the phone against the ring to read the data, select the app you want to delete, and hold the phone against the ring for a few seconds.</p>

<p>It isn't unobtrusive. You'd probably notice someone clutching your hand for a several seconds. But you probably wouldn't notice if you were asleep.</p>

<p>The only damage is rendering your PassKey inoperable. So you would have to revert back to using a different 2FA method. An attacker couldn't steal your data, but they could provide a denial of service attack on you.</p>

<p>It would be great if the ring came with a password. However, there is the risk that if you lost your own password, you'd be unable to write data to it.</p>

<p>I am unqualified to audit the hardware security. If an attacker had physical access to the Ring, could they crack it open and extract the keys from hardware? I don't know.</p>

<h2 id="linux-support-open-source"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#linux-support-open-source">Linux Support &amp; Open Source</a></h2>

<p>The Cybernetic website says the Z1 supports "iOS, Android, Windows. MacOS coming June 2024."  But how well does it work with Linux?</p>

<p>There are <a href="https://github.com/VivoKey">several open source tools repositories available from VivoKey</a> - although none specifically related to the ring.</p>

<p>I took a look at a bunch of <a href="https://ccid.apdu.fr/ccid/section.html">compatible readers</a> and got the ACR1252u-MF (full review later). There are a couple of Linux utilities which claim to work as NFC U2F readers - but the only one I could get working was Bryan Jacob's <a href="https://github.com/BryanJacobs/fido2-hid-bridge">FIDO2 HID Bridge</a>.  Installing was a bit of a faff (yay various Python incompatibilities) and using it means invoking an obscure command on the terminal. But... it worked!</p>

<p>I registered the ring on a service using my Android device, then I was able to sign in to the same service using Firefox on Linux!</p>

<p>Even better - I was <em>finally</em> able to register the ring with GitHub! And, once I'd registered it using Linux, I could sign on with Android. HASHTAG INTEROPERABILITY!</p>

<h2 id="the-broken"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#the-broken">The Broken</a></h2>

<p>And then I kinda broke it. Somehow, the Fidesmo app ended up <a href="https://forum.dangerousthings.com/t/cant-destroy-applets-with-fidesmo/21264/">locking the entire card</a>. Everything still worked - both NDEF and WebAuthN - but I couldn't update the firmware or applets. On the one hand, no one can wipe my OS! But on the other, I can't load new software or fix any bugs.</p>

<p>NFC is <em>fragile technology</em>. Send the wrong obscure command to the device and it will behave unpredictably.</p>

<h2 id="final-verdict"><a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#final-verdict">Final Verdict</a></h2>

<p>For a certain type of nerd, this is awesome. It doesn't have aggressive "geek-chic" branding - it just quietly lets you augment your body with a useful bit of tech.  Now I don't need to search for my key-ring every time I want to log into a secure service.</p>

<p>The flaws with this product are mostly to do with the ecosystem. Mostly.</p>

<p>U2F / FIDO2 / Whatever is pretty nifty technology. When it works, it is just like magic. Wave your hand near your phone and you are authenticated.</p>

<p>When it doesn't work, you might get stuck in a loop trying to work out why things are going wrong.  It's terrifyingly easy to accidentally break something.</p>

<p>FIDO2 is still a pain. Do you know <a href="https://www.beyondidentity.com/developers/blog/fido2-vs-u2f-whats-difference">the difference between CTAP1 and U2F, or how they relate to WebAuthn</a>? Does your favourite service <a href="https://2fa.directory/gb/">support 2FA at all</a>?  Are you happy running a Python script on the CLI if you want to log in?</p>

<p>But that's not the ring's fault. It is early days for the tech and there are teething troubles.</p>

<p>The built-in contact-card portion of the ring is a bit daft. Pointing users to a 3rd party site doesn't seem like the right call for the type of people who'll buy this. I'm glad it could be pointed to a site that I control - albeit by using a different app to write the data.</p>

<p>I got used to wearing the ring after a few days, and it was the exact size that I requested. Although it is chunky, it is a subtle piece of jewellery and unlikely to draw unwanted attention.  There are no LEDs or batteries to worry about.</p>

<p>Despite the teething issues and the price, I'm rather keen on this. Waving my hand next to my phone to exchange cryptographic information makes me feel part-way to being a cyborg-wizard.  Is this the future of wearable technology? I don't know - but it is rather fun.  I'm happy to be an early-adopter and to bash out the bugs in the tech.</p>

<p>If you want, VivoKey will also sell you an <a href="https://vivokey.com/spark/">NFC Implant</a> which you can inject under your skin and use as an MFA token.  Personally, I think I'll stick with the ring!</p>

<p>You can <a href="https://getcybernetic.com/">buy the ring directly from Cybernetic</a>.</p>

<div id="footnotes" role="doc-endnotes">
<hr>
<ol start="0">

<li id="fn:terminology">
<p>FIDO2? U2F? MFA? PassKeys? Some of these are technologies and some are marketing terms. In most cases it is transparent to the user. They type in their username and password, then they have to present another credential. That could be a code sent by a text message, or generated by an app. In this case, they present their NFC token.  Technically, a PassKey is designed to replace usernames and password - present your key and that's the only credential you'll need. The reality is that various sites use these terms interchangeably.&nbsp;<a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#fnref:terminology" class="footnote-backref" role="doc-backlink">↩︎</a></p>
</li>

<li id="fn:issues">
<p>Technical issues. Obviously my many personal issues remain load-bearing.&nbsp;<a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#fnref:issues" class="footnote-backref" role="doc-backlink">↩︎</a></p>
</li>

<li id="fn:tesla">
<p>I don't have a Tesla to test it on. And I'd rather keep it that way!&nbsp;<a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#fnref:tesla" class="footnote-backref" role="doc-backlink">↩︎</a></p>
</li>

<li id="fn:4kb">
<p>Not a typo. NFC is designed for low power and fairly low speed. <a href="https://shkspr.mobi/blog/2020/06/gadget-review-ysshui-ntag215-nfc-tags/">Most commercial NFC tags have about 500 bytes of storage</a>. The memory on this ring will let you share up to 32KB of data - if you remove the other applets.&nbsp;<a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/#fnref:4kb" class="footnote-backref" role="doc-backlink">↩︎</a></p>
</li>

</ol>
</div>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=49592&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[How do I revoke a FIDO / WebAuthN token from every service?]]></title>
		<link>https://shkspr.mobi/blog/2022/12/how-do-i-revoke-a-fido-webauthn-token-from-every-service/</link>
					<comments>https://shkspr.mobi/blog/2022/12/how-do-i-revoke-a-fido-webauthn-token-from-every-service/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Tue, 06 Dec 2022 12:34:36 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[fido]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WebAuthn]]></category>
		<category><![CDATA[yubikey]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=44016</guid>

					<description><![CDATA[After my blog post about recovering my accounts after a disaster, I followed the most repeated advice:   Get two YubiKeys Associate them both with your accounts Keep one off-site in a safe location   OK, done!  My wife and I spend a very boring evening going through every single account we have which supports FIDO tokens with WebAuthN - about a dozen in total.  We manually paired two keys each.…]]></description>
										<content:encoded><![CDATA[<p>After my blog post about <a href="https://shkspr.mobi/blog/2022/06/ive-locked-myself-out-of-my-digital-life/">recovering my accounts after a disaster</a>, I followed the most repeated advice:</p>

<ol>
<li>Get two YubiKeys</li>
<li>Associate them both with your accounts</li>
<li>Keep one off-site in a safe location</li>
</ol>

<p>OK, done!  My wife and I spend a very boring evening going through every single account we have which supports FIDO tokens with WebAuthN - about a dozen in total.  We manually paired two keys each. We put our main key on our keyrings, then drove out to the woods and buried our spares in a a waterproof box in a top secret location<sup id="fnref:loc"><a href="https://shkspr.mobi/blog/2022/12/how-do-i-revoke-a-fido-webauthn-token-from-every-service/#fn:loc" class="footnote-ref" title="51.8486123,-0.5543001" role="doc-noteref">0</a></sup>.</p>

<p>But what if I lost my keys?</p>

<p>Perhaps I could have been pickpocketed or just been careless and dropped them when getting my wallet out.  Either way, I can buy new eurocylinders for my home's doors, replace the padlock on my shed, and grovel to work for a new locker key.</p>

<p>And then, of course, I would have to dig up my backup key and start the painful process of revoking the old one.  But here's the snag...</p>

<p>I have <strong>no idea</strong> which services I've associated my WebAuthN token with!</p>

<p>Firstly, there is staggeringly little chance that the person who found / took my keys would <em>also</em> know my username and password for various services. But we use MFA because we're paranoid, right?  So it makes sense to invalidate the lost token to prevent even the slimmest chance of it being used against me.</p>

<p>Secondly, obviously I know <em>some</em> of the major services that I associated the token with - Facebook, Google, and the Russian crypto exchange where I keep all my money<sup id="fnref:нет"><a href="https://shkspr.mobi/blog/2022/12/how-do-i-revoke-a-fido-webauthn-token-from-every-service/#fn:нет" class="footnote-ref" title="нет" role="doc-noteref">1</a></sup>. But what about the rest?  Should I have made a list of each service I used? Should I have recorded it in my password manager?</p>

<p>Apparently <a href="https://support.yubico.com/hc/en-us/articles/360013790319-How-many-accounts-can-I-register-my-YubiKey-with-">a YubiKey can only hold 25 FIDO2 tokens</a>, but unlimited FIDO U2F tokens. I'll be honest, I've no idea how many I have.  And I don't think there's any way to query my key to see which services it was registered to.</p>

<p>It is <em>probably</em> a good thing that there's no big button which would universally revoke a key. That would be an extremely tempting target for abuse.</p>

<p>But I wish there were an easy way for a user to see where they had used their token. As it stands today, that's impossible.</p>

<div id="footnotes" role="doc-endnotes">
<hr>
<ol start="0">

<li id="fn:loc">
<p>51.8486123,-0.5543001&nbsp;<a href="https://shkspr.mobi/blog/2022/12/how-do-i-revoke-a-fido-webauthn-token-from-every-service/#fnref:loc" class="footnote-backref" role="doc-backlink">↩︎</a></p>
</li>

<li id="fn:нет">
<p>нет&nbsp;<a href="https://shkspr.mobi/blog/2022/12/how-do-i-revoke-a-fido-webauthn-token-from-every-service/#fnref:нет" class="footnote-backref" role="doc-backlink">↩︎</a></p>
</li>

</ol>
</div>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=44016&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2022/12/how-do-i-revoke-a-fido-webauthn-token-from-every-service/feed/</wfw:commentRss>
			<slash:comments>11</slash:comments>
		
		
			</item>
	</channel>
</rss>
