<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=26&amp;t=2463" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-10-20T23:07:37+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=26&amp;t=2463</id>
<entry>
<author><name><![CDATA[peterloron]]></name></author>
<updated>2016-10-20T23:07:37+01:00</updated>
<published>2016-10-20T23:07:37+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2463&amp;p=9113#p9113</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2463&amp;p=9113#p9113"/>
<title type="html"><![CDATA[Re: Can I use a my Neo for OTP + GPG + PIV?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2463&amp;p=9113#p9113"><![CDATA[
Thanks Chris. I actually have a newer Yubikey which fixes the security issue. Just haven't migrated yet.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3244">peterloron</a> — Thu Oct 20, 2016 11:07 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ChrisHalos]]></name></author>
<updated>2016-10-20T22:59:49+01:00</updated>
<published>2016-10-20T22:59:49+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2463&amp;p=9112#p9112</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2463&amp;p=9112#p9112"/>
<title type="html"><![CDATA[Re: Can I use a my Neo for OTP + GPG + PIV?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2463&amp;p=9112#p9112"><![CDATA[
Nope, you're safe. The two OTP configuration slots, U2F, PIV, OpenPGP, and YubiOATH (Yubico Authenticator) are all independent, so initializing the PIV applet won't do anything to the OpenPGP applet or the configuration slots. If you're actively using GPG, you should review the security vulnerability. You would be affected on 3.3.0 (<!-- m --><a class="postlink" href="https://developers.yubico.com/ykneo-openpgp/SecurityAdvisory%202015-04-14.html">https://developers.yubico.com/ykneo-ope ... 04-14.html</a><!-- m -->), as your applet is probably 1.0.6 or 1.0.7.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3140">ChrisHalos</a> — Thu Oct 20, 2016 10:59 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[peterloron]]></name></author>
<updated>2016-10-20T22:31:07+01:00</updated>
<published>2016-10-20T22:31:07+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2463&amp;p=9110#p9110</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2463&amp;p=9110#p9110"/>
<title type="html"><![CDATA[Can I use a my Neo for OTP + GPG + PIV?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2463&amp;p=9110#p9110"><![CDATA[
I have a Yubikey Neo (3.3.0) which I currently have set up for OTP and with the GPG applet. Works well. I'd like to also use it for PIV with OSX Sierra. <br /><br />When I plug the key in with the PIV Manager running, it wants me to create a PIN in a dialog called &quot;Device Initialization&quot;. Sounds scary...<br /><br />Will this wipe the other settings and data on the key and make it PIV only or will it simply add the configuration needed to support PIV while leaving existing OTP and apples functionality intact?<br /><br />Thanks.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3244">peterloron</a> — Thu Oct 20, 2016 10:31 pm</p><hr />
]]></content>
</entry>
</feed>