mouse008 wrote:
I don't think any current smartcards store keys encrypted. If your threat model includes adversary capable of extracting private keys from silicon, you have bigger problems than a $40 device is likely to address.
Give me 1 reason why you are not using the user's PIN (1-256 character, digits, letters) to encrypt the private-keys on the silicon? It has nothing to do with threat-models at all, it's just common sense.
... So IF you loose your Yubikey for whatever reason ... you come home ... and lay in bed ... and know exactely as your thoughts are circling ... "Oh Dear. All the private-key material is stored there in plain text with no additional cryptographic protection at all." Then you are beginning to worry my friend, because then you are pretty f* up cause
you just lost your private-keys, like a 12 year old school kid just lost his lunch and milky money. And guess what ... it has nothing to do with any conspiracy theory or three-letter-agency ...
it's just not reasonable to store private-key material in plain-text on the hardware.