Hacker News new | past | comments | ask | show | jobs | submit | jans23's comments login

We at Nitrokey develop firmware in Rust and are looking for (also newbie) developers. You are welcome to send your application.


A USB security key such as Nitrokey could be handy for code signing, git and Github access.


We are building Web Crypt which can be used for encryption purposes in web browsers. https://github.com/Nitrokey/nitrokey-webcrypt/


Thank you ever so much for finding my grumble! I can't believe you did. Much appreciated. What a wonderful expeditious work you all are up to. This is a fantastic effort. Thanks for the initiative, all, very well done.


Nitrokey ships world wide.


I think this can be better explained by starting with the company (instead of the device) which is lean but still requires development and maintenance, purchasing and manufacturing, billing and accounting, customer support, management, shipment and logistics. Those tasks need to be paid.


For Nitrokey Start and Pro: Only during generation of key, it can be backed up.

The Nitrokey HSM supports encrypted backups of keys.


Some Nitrokeys contain smart cards and those don't support Curve25519 as of now.


Plausible deniability refers to Nitrokey Storage's hidden volumes. They can optionally be setup, but no need to, and without the appropriate password it can't be distinguished. Similiar to VeraCrypt's hidden volumes.


Yes and? If you carry this on your keychain heading into a security checkpoint, expect to receive interrogation++.


So how long do they interrogate you before deciding there's really no hidden volume? And even if you do reveal a hidden volume, how could they ever know it's the only one? It's pointless, even if they know about the technology.


It really much depends on the individual case. In a constitutional state it should make a difference if obviously an encrypted volume is used or if there is the possibility but no certainty of one, two, three or four hidden volumes.


Measured boot allows to verify the integrity of the installed firmware (which itself verifies the integrity of the Linux boot partition) by a separate Nitrokey. The idea is that you have your Nitrokey nearby and therefore safe against compromise, other than the laptop which may be left unattended.


Yes, this works since ages. Here are details: https://www.nitrokey.com/solutions/sichere-administration-vo...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: