U2F Zero is an open source U2F token for 2 factor authentication.
 
 
 
 
 
 
Go to file
Conor Patrick 1de9c42e2b example fields 2016-08-29 23:54:36 -04:00
firmware programming improvements 2016-08-18 02:16:38 -04:00
hardware add bottom silk screen to label bottom pins 2016-08-21 20:00:39 -04:00
mechanical add flashing harness 2016-06-05 13:41:54 -04:00
tools example fields 2016-08-29 23:54:36 -04:00
.gitignore programming by serial number for adapter and token for parallelized programming 2016-07-25 03:11:10 -04:00
LICENSE.txt add bsd license 2016-06-18 10:40:01 -04:00
README.md Update README.md 2016-07-07 22:36:43 -04:00

README.md

U2F Zero

U2F Zero is an open source U2F token for 2 factor authentication. It is implemented securely. It works with Google accounts, Github, Duo, and anything else supporting U2F.

You can easily build your own. You just need to order the 8 SMT parts, $1.13-$3.5 per PCB, and programmer. It ends up being $35 for programmer and ~$5/board. The token should be durable enough to survive on a key chain for years, even after going through the wash.

Check out the wiki for more on how to build your own.

Security Overview

The security level is about the same as a modern car key. Any secret information cannot be read or duplicated. A true random number generator is used to create unpredictable keys.

However, side channel leakage is an unsolved problem in industry and academia. So for well equipped adversaries that can make targetted attacks and get physical access, secret information leakage is possible. Any other hardware token that claims it's "impenetrable" or otherwise totally secure is still vulnerable to physical side channels and it's important to acknowledge. However, most people don't worry about targeted attacks from well equipped adversaries.

For more information about U2F Zero's secure implementation and the problem of side channels, check out the wiki.

License

Everything is open source and licensed under the Simplified BSD License.