U2F Zero is an open source U2F token for 2 factor authentication.
 
 
 
 
 
 
Go to file
Conor Patrick a6c0343903 shaffolding 2016-11-12 22:36:44 -05:00
firmware shaffolding 2016-11-12 22:36:44 -05:00
hardware undo revert 2016-11-12 21:08:26 -05:00
mechanical add flashing harness 2016-06-05 13:41:54 -04:00
tools add setuptools 2016-11-12 20:59:57 -05:00
.gitignore programming by serial number for adapter and token for parallelized programming 2016-07-25 03:11:10 -04:00
LICENSE.txt add bsd license 2016-06-18 10:40:01 -04:00
README.md make limit more prominent 2016-09-30 12:09:08 -04:00

README.md

U2F Zero

U2F Zero is an open source U2F token for 2 factor authentication. It is implemented securely. It works with Google accounts, Github, Duo, and anything else supporting U2F. It can be used with 15 services at a time.

You can easily build your own. You just need to order the 8 SMT parts, $1.13-$3.5 per PCB, and programmer. It ends up being $35 for programmer and ~$5/board. The token should be durable enough to survive on a key chain for years, even after going through the wash.

Check out the wiki for more on how to build your own.

Security Overview

The security level is about the same as a modern car key. Any secret information cannot be read or duplicated. A true random number generator is used to create unpredictable keys.

However, side channel leakage is an unsolved problem in industry and academia. So for well equipped adversaries that can make targetted attacks and get physical access, secret information leakage is possible. Any other hardware token that claims it's "impenetrable" or otherwise totally secure is still vulnerable to physical side channels and it's important to acknowledge. However, most people don't worry about targeted attacks from well equipped adversaries.

For more information about U2F Zero's secure implementation and the problem of side channels, check out the wiki.

License

Everything is open source and licensed under the Simplified BSD License.