Greetings! Recently, i have found out that i had an unused Raspberry Pi Pico that i did not do anything with ever since i bought it.

A random idea struck in my mind, i wanted to turn it into a security key!(https://www.picokeys.com/pico-fido/) Security keys (like the yubikey) are so goddamn expensive in my country. While i got a Raspberry Pi Pico for cheap. However, this brings me to the question: How secure can it be? Can anyone crack/clone the security keys off of it?

Thanks in advance.

  • drspod
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    1 day ago

    It protects you against your PC being compromised but it doesn’t protect you from someone stealing the device, assuming they have the necessary expertise to read the keys out of the device.

    A regular laptop thief will have no idea what they’re looking at though, so it does have some value as a physical security (through obscurity) device.

    Ultimately it depends on your threat model. If you never leave the house then it’s an upgrade from a software password manager.

  • j4k3@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    2 days ago

    You generally want to use a trusted protection module (TPM) chip like what is on most current computers and Pixel phones. The thing to understand about the TPM chips is that they have a set of unique internal keys that cannot be accessed at all. These keys are used to hash against and create other keys. The inaccessibility of this unique keyset is the critical factor. If you store keys in any regular memory, you are taking a chance.

    Maybe check out Joe Grand’s YT stuff. He has posted about hacking legit keys to recover large crypto amounts. Joe is behind the JTAGulator, if you have ever seen that one, and was a famous child hacker going by “Kingpin.”

    I recall reading somewhere about a software implementation of TPM for secure boot, but I didn’t look into it very deeply and do not recall where I read about it. Probably on Gentoo, Arch, or maybe in the book Beyond Bios (terrible)

    Andrew Huang used to have stuff up on YT that would be relevant to real security of such a device, but you usually need to know where he wrote articles to find links because most of his stuff isn’t publicly listed on YT. He has also removed a good bit over the years when certain exploits are unfixable like accessing the 8051 microcontroller built into most SD cards and running transparently. Andrew is the author of Hacking the Xbox which involved basically a man in the middle attack on a high speed PCIE (IIRC) connection.

    It would be a ton of work to try to reverse engineer what you have created and implemented in such a device. Unless you’re storing millions, it is probably not something anyone is going to mess with.

  • m-p{3}@lemmy.ca
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    2 days ago

    You’d be better of security-wise looking for a secure alternative to the Yubikey, such as the NitroKey, Feitian, and some others. As long as their hardware is FIDO2-certified and the key has the capabilities you want (FIDO2, GPG, etc), you should be in business.