Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Very. They are a tiny Swedish company that pay for top talent, are quite active and hands-on in the netsec community. It's not a faceless corporation with a Chinese PO Box.


If you are looking for a tiny, Swedish company working in a similar area as Yubico, there is Tillits AB. Tillitis is a spin off from the Swedish VPN provider Mullvad. In contrast to Yubikeys, The Tillitis TKey as well as tools, device verification etc is 100% open source.

https://tillitis.se/

https://github.com/tillitis

https://mullvad.net/en

(Full disclosure: I work for Tillitis.)


The key costs 880 SEK. That's about 78 euros or 85 dollars. It's designed to be future proof, with applications being uploaded to the device by the host.

The website feels a bit cramped with all the large text on desktop, like it was only tested on phones


the background makes it badly readable on phones too


Good grief, the text on tillitis.se is obnoxiously large and the information density extremely low.


Interesting product, thanks for sharing.

Can it hold gpg keys and interface with gpg-agent? I couldn't find that information.


No and yes. ;-)

The TKey does not have any persistent memory available for applications to store things. The idea is that we measure (calculate a keyed digest using BLAKE2s) the application during loading. The keyed digest (called CDI) is used as a base secret, random value by the application to derive the secrets the application needs. The Ed25519 signer for example derive its keypair based on the CDI.

A PGP application could use this to determinstically derive a keypair.

The FW application loader will also accept a User Supplied Secret (USS), which is also used during the calculation of the CDI. This means that the keypair derived will be based on the specific TKey device, the integrity to the device application and the USS. One way to use the USS is to control which keypair to derive. For example for SSH, different USS can derive keys used for different servers.

Also, a device application may use the CDI to derive wrapping keys, and then use authenticated encryption to protect a cookie that can be stored on the TKey client machine between usage.

We are working on providing libraries and examples for app developers to do this.

And to the yes part of the answer: Yes, a TKey could talk to a PGP agent and be called upon when needed. This is similar to how a SSH agent can talk to TKey today.


Is the TKey tamper-proof?


No, not yet. Physical attacks are out of scope for the TKey1, even if we have some mechanisms in play which try to extend the time and effort required to perform a successful evil maid-attack extracting the Unique Device Secret (UDS). See the threat model for the release:

https://github.com/tillitis/tillitis-key1/blob/main/doc/thre...

The current casing is fairly tamper evident (it will break), but we do not yet use real, tamper evident sealing. We are looking at tamper sealing for future versions. And ways to further protect against physical attacks.


When you do, please think about a special price for existing customers ;-)


Tiny is a bit misleading. The turnover is about 100 MUSD. The company has about 300 employees, with offices in all regions of the world and a lot of R&D in the USA.


I wasn't aware they had grown that much. Thanks for the correction


Thanks for the info!

The construction quality of Yubikeys has been good in my experience.

I was just worried about the closed source proprietary firmware in a security product (including the random number generators, where issues were discovered in the past).

But Yubikeys are used in various companies and apparently in some branches of governments too, thus must have been vetted by their security teams (though there could be different lines of firmware or products for different clients. People say there is not much benefit to purchasing FIPS-compliant Yubikeys. Neglecting the approved algorithms and features, is the firmware the same as that in non-FIPS security keys?)


US government had a nice little swedish cryptography company there for a bit too...


Do you mean Swiss (classic!) or was there another one?

https://en.wikipedia.org/wiki/Crypto_AG


Though started by the Swede Boris Hagelin.

https://en.wikipedia.org/wiki/Boris_Hagelin


Ah, true, I forgot!


They were a tiny Swedish company…


> It's not a faceless corporation with a Chinese PO Box.

On this note, are Feitian still the OEM for the Google Titan keys?




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: