Is it possible to see the pubkeys that pair with private keys inside the TPM in Windows?

Is it possible to inspect data (pubkeys, domain names used for webauthn, not private keys) related to private keys stored in the TPM on Windows?

I legally own the hardware and have maximum permissions on my user account
I have the necessa… Continue reading Is it possible to see the pubkeys that pair with private keys inside the TPM in Windows?

Can I use an iPhone connected via USB to a computer as a FIDO2 security key (for example in OpenSSH)? [migrated]

In the same way that I can use a Yubikey or any other FIDO2 hardware key to store resident keys for use with OpenSSH (for example ssh-keygen -t ed25519-sk -O resident -O verify-required) I would like to use my iPhone. I have my iPhone most… Continue reading Can I use an iPhone connected via USB to a computer as a FIDO2 security key (for example in OpenSSH)? [migrated]

FIDO2: should I set user verification to "discouraged" with two-factor authentication?

I provide a web application that uses FIDO2 for two-factor authentication. Recently I got reports that Windows users have to enter a PIN each time they use their hardware token. As far as I understand, this is considered a form of user ver… Continue reading FIDO2: should I set user verification to "discouraged" with two-factor authentication?

Reading SSH private key physically stored on yubikey to remote into external PC

I was wondering if it’s possible to only store and read a ssh private key on a yubikey and not read the private key the yubikey generated from a client computer?
Currently the only way it seems to work is that I store the private key on cl… Continue reading Reading SSH private key physically stored on yubikey to remote into external PC

Is FIDO2 authentication vulnerable to a social engineering replay attack?

I’m starting to learn about the FIDO2 standard, and I’m wondering if this scenario is possible…

Victim visits a credential harvesting page and enters their credentials
Credential harvesting backend opens a connection to the legitimate l… Continue reading Is FIDO2 authentication vulnerable to a social engineering replay attack?

What security measures does YubiKey take to secure its hardware from malicious firmware tampering? [closed]

We’ve all certainly heard about the widely overhyped BadUSB exploits on the Physon microcontrollers.
There’s certainly a high potential of gaining something by targeting such a specific device, which is designed to only contain secrets.
Ev… Continue reading What security measures does YubiKey take to secure its hardware from malicious firmware tampering? [closed]