<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=35&amp;t=2291" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-04-29T00:25:06+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=35&amp;t=2291</id>
<entry>
<author><name><![CDATA[ChrisHalos]]></name></author>
<updated>2016-04-29T00:25:06+01:00</updated>
<published>2016-04-29T00:25:06+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2291&amp;p=8577#p8577</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2291&amp;p=8577#p8577"/>
<title type="html"><![CDATA[Re: Could a stolen Yubikey be used to emit a static passcode]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2291&amp;p=8577#p8577"><![CDATA[
The button on the YubiKey is a capacitive touch sensor, not a biometric, so yes, anyone with physical possession of the YubiKey can use the Slot 1 / Slot 2 credentials. This is why we recommend, if you are going to use a static password, to have the YubiKey only provide part of the password (i.e. type in a short password, followed by using the YubiKey to send the remainder of the password). <br /><br />If you lose your YubiKey and someone finds it, they aren't going to know what the credential goes to, as there is no identifiable information on it. The only part of the YubiKey that requires validation before being able to use a credential is the OATH applet (although a password isn't required here), PIV, and OpenPGP.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3140">ChrisHalos</a> — Fri Apr 29, 2016 12:25 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[genealogyxie]]></name></author>
<updated>2016-04-28T03:29:56+01:00</updated>
<published>2016-04-28T03:29:56+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2291&amp;p=8576#p8576</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2291&amp;p=8576#p8576"/>
<title type="html"><![CDATA[Could a stolen Yubikey be used to emit a static passcode?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2291&amp;p=8576#p8576"><![CDATA[
So I setup my Windows 10 Pro computer with Bitlocker according to this: <!-- l --><a class="postlink-local" href="http://forum.yubico.com/viewtopic.php?f=16&amp;t=1054&amp;p=8575#p8575">viewtopic.php?f=16&amp;t=1054&amp;p=8575#p8575</a><!-- l --><br /><br />It took me a while, but I realized what it was wanting me to do is program a regular password into the Yubikey so it will type in that password whenever I press the button.<br /><br />But if my Yubikey were stolen, wouldn't the hacker know the password? Seems like very low security<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4302">genealogyxie</a> — Thu Apr 28, 2016 3:29 am</p><hr />
]]></content>
</entry>
</feed>