Not ELI5 level but…
If you understand SSH keys, it’s basically that there’s a private key and a public key.
Whatever website has a copy of the public key, they encrypt something with the public key, you decrypt it, reencrypt it and send it back (where they can then decrypt it). By performing that round trip, you’ve verified you have the correct key, and the “door opens.”
callmepk@lemmy.world 7 months ago
Basically hardware keys (like YubiKey) without hardware
zewm@lemmy.world 7 months ago
So…. Software keys…
mp3@lemmy.ca 7 months ago
a.k.a password-protected certificates
SuperIce@lemmy.world 7 months ago
locuester@lemmy.zip 7 months ago
Most in the crypto industry wouldn’t consider a hardware key that shares metal with an internet connected device to be a very safe hardware key though. Of course when your hardware key such as a ledger or yubikey is plugged into your computer, now it’s also sharing metal.
I think the industry needs a term to differentiate between all these categories of hardware wallets.
The best is an airgapped hardware wallet such as Keystone.