<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=16&amp;t=67" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2008-06-02T08:35:33+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=16&amp;t=67</id>
<entry>
<author><name><![CDATA[Simon]]></name></author>
<updated>2008-06-02T08:35:33+01:00</updated>
<published>2008-06-02T08:35:33+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=67&amp;p=141#p141</id>
<link href="https://forum.yubico.com/viewtopic.php?t=67&amp;p=141#p141"/>
<title type="html"><![CDATA[Re: otp harvesting]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=67&amp;p=141#p141"><![CDATA[
Thanks for your thoughts.  We will extend our product line eventually, but right now we focus on getting the most simple to use and most reliable approach &quot;out there&quot;.<br /><br />Note that there are some standards based solutions, like OATH HOTP that also doesn't rely on a clock or challenge response.  It is considered good enough by some companies.  I do understand (and agree with) your concern that it isn't good enough everywhere though.<br /><br />Thanks,<br />Simon<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2">Simon</a> — Mon Jun 02, 2008 8:35 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[metamind]]></name></author>
<updated>2008-05-29T21:43:57+01:00</updated>
<published>2008-05-29T21:43:57+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=67&amp;p=116#p116</id>
<link href="https://forum.yubico.com/viewtopic.php?t=67&amp;p=116#p116"/>
<title type="html"><![CDATA[Re: otp harvesting]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=67&amp;p=116#p116"><![CDATA[
Re the battery compartment. If you make the units cheap enough then embed the battery in the resin. It preserves the unit's physical integrity / strength and you will have repeat customers as well.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=86">metamind</a> — Thu May 29, 2008 9:43 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[metamind]]></name></author>
<updated>2008-05-29T21:32:39+01:00</updated>
<published>2008-05-29T21:32:39+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=67&amp;p=113#p113</id>
<link href="https://forum.yubico.com/viewtopic.php?t=67&amp;p=113#p113"/>
<title type="html"><![CDATA[Re: otp harvesting]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=67&amp;p=113#p113"><![CDATA[
Sure there would be some downsides to having a battery but I don't think they are that onerous. It would probably add 20% to the cost and last 3 years. This is not such a cost compared to the value of the information being protected. It would mean that you / I could answer the question &quot;is this as secure as a football / dongle&quot; with a &quot;yes&quot;. There are many different markets for a product such as yours. The current YubiKey is great for paid service offerings (online tv etc) where you potentially have a few extra viewers watching for free but corporate data is too valuable and harvesting is a definite issue. You should definitely concider it as a seperate product offering.<br /><br />Wouldn't a second harvested otp work in the two-otps-required scenario.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=86">metamind</a> — Thu May 29, 2008 9:32 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jakob]]></name></author>
<updated>2008-05-29T20:46:21+01:00</updated>
<published>2008-05-29T20:46:21+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=67&amp;p=110#p110</id>
<link href="https://forum.yubico.com/viewtopic.php?t=67&amp;p=110#p110"/>
<title type="html"><![CDATA[Re: otp harvesting]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=67&amp;p=110#p110"><![CDATA[
Are you refering to some kind of constantly running timer ? <br /><br />That would add additional protection against harvesting, but with the downside of requiring a battery.<br /><br />Batteries = cost + limited shelf life + large source of failures + requires battery compartment + additional regulatory burden (at least here in the EU).<br /><br />A service requiring OTPs to be sent twice during a session can add protection against harvesting. We beleive that is a good compromise given that we get rid of the battery.<br /><br />Regards,<br /><br />Jakob E<br />Firmware and Hardware guy @ Yubico<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=83">Jakob</a> — Thu May 29, 2008 8:46 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[metamind]]></name></author>
<updated>2008-05-29T09:49:23+01:00</updated>
<published>2008-05-29T09:49:23+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=67&amp;p=100#p100</id>
<link href="https://forum.yubico.com/viewtopic.php?t=67&amp;p=100#p100"/>
<title type="html"><![CDATA[otp harvesting]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=67&amp;p=100#p100"><![CDATA[
Hi,<br /><br />Do you plan on producing a yubikey that has a timer in it so that some sort of time code can come from the key? This would stop a key being &quot;borrowed&quot; and the otps being harvested. These keys would be valid until the user authenticates again using the real key.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=86">metamind</a> — Thu May 29, 2008 9:49 am</p><hr />
]]></content>
</entry>
</feed>