| ▲ | comprev an hour ago | |||||||||||||||||||||||||
Inability to export the private key is no different from using an YubiKey? You can't "backup" the private key they generate either. | ||||||||||||||||||||||||||
| ▲ | johnisgood an hour ago | parent | next [-] | |||||||||||||||||||||||||
Yeah, that is why you should not generate it on a YubiKey. You need to have: - an offline master private key backup (air-gapped) - primary YubiKey (daily use) - backup YubiKey (locked away) - revocation certificate (separate storage) (it is your kill-switch) Having a second YubiKey enrolled is the standard practice. What people do wrong is: - They generate directly on YubiKey - They only use one device - They do not create a revocation certificate - They have no offline backups You generate your GPG keys on a secured system, load the subkeys (not the master because it is not used for daily cryptography) into the YubiKeys, and then remove the secret keys from this system where you generated the keys. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | nothrabannosir 43 minutes ago | parent | prev | next [-] | |||||||||||||||||||||||||
Which makes yubikey impossible to use with geographically distributed backups. You need the backup available at all times for when you want to register with any new service. This is why you should use a device which allows exporting the seed, like e.g. multi purpose hardware crypto wallets. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | an hour ago | parent | prev [-] | |||||||||||||||||||||||||
| [deleted] | ||||||||||||||||||||||||||