How I secure my setup with a YubiKey
Read OriginalThis technical guide details the author's personal setup using YubiKey 5C NFC devices for authentication. It covers using YubiKeys for two-factor authentication (2FA) on websites, generating secure SSH keys stored on the device, and configuring sudo prompts to require physical key confirmation. The article includes practical advice, security benefits, and important warnings about backup strategies and threat model considerations.
Comments
No comments yet
Be the first to share your thoughts!
Browser Extension
Get instant access to AllDevBlogs from your browser
Top of the Week
1
The Beautiful Web
Jens Oliver Meiert
•
2 votes
2
Container queries are rad AF!
Chris Ferdinandi
•
2 votes
3
Wagon’s algorithm in Python
John D. Cook
•
1 votes
4
An example conversation with Claude Code
Dumm Zeuch
•
1 votes
5
Top picks — 2026 January
Paweł Grzybek
•
1 votes
6
In Praise of –dry-run
Henrik Warne
•
1 votes