Having hardware protected private keys is the best way and OnlyKey allows easily using these keys with OpenPGP and SSH. To see how this works we will demonstrate creating an OpenPGP key in Protonmail, loading it onto OnlyKey, and then using it with GnuPG. We also have a guide here.

It’s as easy as 1. 2. 3.

1) Create “State of the art X25519 (Modern, fastest, secure)” key in Protonmail

2) Export this key and load key onto OnlyKey using the OnlyKey App 

3) Create GnuPG identity with onlykey-gpg, use gpg with your Protonmail, Keybase, or other OpenPGP key securely stored in hardware.

You can do things like sign your emails, git commits, and software packages, manage your passwords (with pass and gopass, among others), authenticate web tunnels and file transfers, and more. Since many 3rd party applications already integrate with SSH-agent and GnuPG you can use those as well.

 

You can also now use Webcrypt for OpenPGP messages & files on-the-go in the browser

Stored keys on OnlyKey is a great way to securely use OpenPGP and SSH. If you want an even easier option OnlyKey supports derived keys, no OpenPGP key loading necessary. OnlyKey generates the keys for you.

For SSH there is an additional option, OpenSSH as of version 8.2 supports FIDO2 resident keys. Use OnlyKey to store SSH keys that can be used directly in in OpenSSH by following our guide here.

Latest Stories

Tout afficher

Securing the Future: Comparing YubiKey and OnlyKey in the Evolving Multifactor Authentication Landscape

Securing the Future: Comparing YubiKey and OnlyKey in the Evolving Multifactor Authentication Landscape

As cybersecurity threats continue to evolve, multifactor authentication (MFA) has become a critical safeguard for protecting sensitive data. YubiKey security keys are among the most widely adopted tools for MFA, enhancing security by requiring a physical device for user authentication....

Plus

Defragmenting Enterprise Authentication | An Improved Approach to Identity Access Management

Defragmenting Enterprise Authentication | An Improved Approach to Identity Access Management

In the ever-evolving landscape of cybersecurity, Chief Information Security Officers (CISOs) face a persistent challenge: securing authentication mechanisms within their organizations. Despite numerous predictions heralding the end of passwords, they remain a cornerstone of digital security. This article delves into...

Plus

The Fragility of Centralized Services: A Case for Decentralized Solutions

The Fragility of Centralized Services: A Case for Decentralized Solutions

Centralized services, while convenient, come with significant vulnerabilities. They require users to trust third parties with their data, creating potential single points of failure. When these systems falter, the repercussions can be widespread and severe. For example, CrowdStrike, a prominent...

Plus