101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

500
active users

#yubikeys

0 posts0 participants0 posts today
yawnbox :rebel:<p>I've written a new blog post (9000 words) taking a moderately deep dive into "Threat Modeling YubiKeys and Passkeys"</p><p><a href="https://yawnbox.is/blog/threat-modeling-yubikeys-and-passkeys/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yawnbox.is/blog/threat-modelin</span><span class="invisible">g-yubikeys-and-passkeys/</span></a></p><p>I greatly welcome feedback as I want to make sure I'm not misrepresenting anything. I want to make it better if it can be improved. I'm happy to be wrong, just please provide details and links!</p><p>also, i need a job! if you like my work, maybe you know of something where i'd be a good fit.</p><p><a href="https://disobey.net/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://disobey.net/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://disobey.net/tags/IAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IAM</span></a> <a href="https://disobey.net/tags/FIDO2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FIDO2</span></a> <a href="https://disobey.net/tags/WebAuthn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebAuthn</span></a> <a href="https://disobey.net/tags/YubiKey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YubiKey</span></a> <a href="https://disobey.net/tags/YubiKeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YubiKeys</span></a> <a href="https://disobey.net/tags/passkey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkey</span></a> <a href="https://disobey.net/tags/passkeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkeys</span></a> <a href="https://disobey.net/tags/GetFediHired" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GetFediHired</span></a></p>
Cliff<p>YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel.</p><p><a href="https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2024/</span><span class="invisible">09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/</span></a></p><p><a href="https://allthingstech.social/tags/YubiKeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YubiKeys</span></a> <a href="https://allthingstech.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://allthingstech.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://allthingstech.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://allthingstech.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a> <a href="https://allthingstech.social/tags/AllThingsTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AllThingsTech</span></a> <a href="https://allthingstech.social/tags/SecurityKey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityKey</span></a></p>
[^BgTA^] :verified: :opensuse:<p>Sembla que han descobert una “vulnerabilitat” a les <a href="https://mastodon.in4matics.cat/tags/Yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Yubikeys</span></a>, ja que són “clonables”. </p><p><a href="https://mastodon.in4matics.cat/tags/Ciberseguretat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ciberseguretat</span></a> <a href="https://mastodon.in4matics.cat/tags/SeguretatDigital" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SeguretatDigital</span></a> <a href="https://mastodon.in4matics.cat/tags/Tecnologia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tecnologia</span></a> <a href="https://mastodon.in4matics.cat/tags/Autenticaci%C3%B3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Autenticació</span></a> <a href="https://mastodon.in4matics.cat/tags/Privacitat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacitat</span></a> <a href="https://mastodon.in4matics.cat/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.in4matics.cat/tags/SeguretatInform%C3%A0tica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SeguretatInformàtica</span></a></p><p>Com diu <span class="h-card" translate="no"><a href="https://mstdn.social/@rysiek" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rysiek</span></a></span>, l'atac requereix:</p><p>- Obrir físicament la YubiKey<br>- Accés físic a la YubiKey “mentre s'autentica”<br>- Equips de laboratori d'electrònica no trivials</p><p>... Bàsicament, en tots els escenaris possibles, estàs més segur utilitzant una <a href="https://mastodon.in4matics.cat/tags/YubiKey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YubiKey</span></a> que no utilitzar-ne cap.</p><p><a href="https://mstdn.social/@rysiek/113075472648375180" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mstdn.social/@rysiek/113075472</span><span class="invisible">648375180</span></a></p>
Mad A. Argon :qurio:<p>And this happened... I accidentally left my <a href="https://is-a.cat/tags/yubikey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikey</span></a> (this one on dogtag chain I always had on me) in friend's house :blobcatsad2: <br>Now I really feel naked or like I sudenly lost my weapon or my "magic powers". Have to take it back soon because it's very uncomfortable even if technically I have enough backup configurations to use other <a href="https://is-a.cat/tags/yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikeys</span></a> to access my things (all my devices/accounts are strongly dependent on yubikeys so I made good backups from the beginning).</p><p><a href="https://is-a.cat/tags/amulet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>amulet</span></a> <a href="https://is-a.cat/tags/talisman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>talisman</span></a> <a href="https://is-a.cat/tags/MagicalThinking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MagicalThinking</span></a></p>
Mad A. Argon :qurio:<p>Some time ago I watched low budget horror movie. Not very mainstream one, I don't even remember title yet. Main character involuntarily became kind of undead and had to wear some magic <a href="https://is-a.cat/tags/amulet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>amulet</span></a>. When she was taking it off, she was closer to afterlife dimension and eventually really dead, even if in reversible way.</p><p>Currently I feel in similar way after 5 years of wearing one of my <a href="https://is-a.cat/tags/Yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Yubikeys</span></a> on my neck on dogtag chain. I have it on me really most of time, also when I sleep (not when I wash myself, it would be inconvenient even if it's waterproof). Sometimes I take it off, even for few hours (very rarely) but then it is always few meters from me. And then I feel like I lose connection with some "higher force", source of my "special powers" (or source of my identity? my soul?) or something and it's rather uncomfortable.</p><p>So it seems like cryptography and privacy obsession turned me into a <a href="https://is-a.cat/tags/lich" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lich</span></a> :blobcatghost: 💀🧟‍♀️</p><p><a href="https://is-a.cat/tags/yubikey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikey</span></a> <a href="https://is-a.cat/tags/MagicalThinking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MagicalThinking</span></a></p>
Royce WilliamsWelcome changes to YubiKey hardware and software (firmware version 5.7 train) announced, including:
Mad A. Argon :qurio:<p>Short cautionary story</p><p>I wanted to synchronize <a href="https://is-a.cat/tags/OTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTP</span></a> on my all <a href="https://is-a.cat/tags/yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikeys</span></a> - now five because of circumstances, I wanted to have every one replaceable with each other and don't wonder which one I must use. <br>For people not familiar with them, OTP codes are stored on <a href="https://is-a.cat/tags/yubikey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikey</span></a> itself, apps are interfaces to interact with it. So they could be used on any device with any version of <a href="https://is-a.cat/tags/YubicoAuthenticator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YubicoAuthenticator</span></a> app. I mostly use terminal version on my Linux desktop. And during new account/credential creation user usually writes all in one command, together with seed code.</p><p>It was some time since I created something, so I tried to check correct command syntax in <a href="https://is-a.cat/tags/shell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shell</span></a> <a href="https://is-a.cat/tags/history" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>history</span></a>. And suddenly I realized I have all seed codes stored in history, ready to reuse.</p><p>For me it was convenient then, I didn't have to register in all services again, simply copy-paste old commands for new keys. But everyone could see how it could be terrible for <a href="https://is-a.cat/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> :blobcat_ohnoes:​</p><p>Everyone with access to my laptop and terminal could also use them. Of course I use <a href="https://is-a.cat/tags/LUKS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LUKS</span></a> so my shell history (or other data on my laptop) isn't easily available :blobCat_evil:​</p><p>So, be careful what you could have in shell history.<br>And use full disk <a href="https://is-a.cat/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> everywhere, just in case, you could forget many small things in various places!</p><p><a href="https://is-a.cat/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://is-a.cat/tags/2fa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2fa</span></a> <a href="https://is-a.cat/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
ph0wn<p>Hands-on hardware security key with <span class="h-card" translate="no"><a href="https://mastodon.social/@ipolit" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ipolit</span></a></span> <br> and Nils Amiet. Skilled speakers and excellent CTF players... they will introduce you to security keys like <a href="https://infosec.exchange/tags/Yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Yubikeys</span></a>.</p><p>Bring your key (whatever brand) for this workshop please!</p>
Fabian (Bocchi) 🏳️‍🌈<p>frustrating things I learned the last 2 days<br><a href="https://mstdn.social/tags/Yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Yubikeys</span></a> gpg-card default pin is 123456, admin pin is 12345678. if you enter the admin key 3 times wrong, you need to factory reset the gpg-card feature<br><a href="https://www.gnupg.org/howtos/card-howto/en/ch03s02.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gnupg.org/howtos/card-howto/en</span><span class="invisible">/ch03s02.html</span></a></p><p>If you use pinentry loopback (CLI-input), it wont tell you if you need to enter the user or admin pin. <a href="https://mstdn.social/tags/gnome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gnome</span></a> console doesnt work reliably with the loopback pinentry, the loopback itself is very wonky.</p><p><a href="https://mstdn.social/tags/gpg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gpg</span></a> <a href="https://mstdn.social/tags/yubico" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubico</span></a> <a href="https://mstdn.social/tags/smartcard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>smartcard</span></a> <a href="https://mstdn.social/tags/frustation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>frustation</span></a> <a href="https://mstdn.social/tags/rage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rage</span></a></p>
Karl Voit :emacs: :orgmode:<p><span class="h-card"><a href="https://moessingen.social/@frank" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>frank</span></a></span> <span class="h-card"><a href="https://social.tchncs.de/@keno3003" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>keno3003</span></a></span> Du meinst Resident Keys: <a href="https://duo.com/labs/tech-notes/resident-keys-and-the-future-of-webauthn-fido2" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">duo.com/labs/tech-notes/reside</span><span class="invisible">nt-keys-and-the-future-of-webauthn-fido2</span></a></p><p>AFAIK brauchst du die nur für <a href="https://graz.social/tags/Passkeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passkeys</span></a> aber nicht für Standard <a href="https://graz.social/tags/FIDO2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FIDO2</span></a>. Mein <a href="https://graz.social/tags/Solokeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Solokeys</span></a> hat 50 slots für Resident Keys, manche <a href="https://graz.social/tags/Yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Yubikeys</span></a> nur 25.</p><p>Du kannst aber unendlich viele FIDO2 Services mit einem Token betreiben. Noch ein Vorteil von FIDO2 HW-Token.</p><p>HTH</p>
JP :popos: :pine64: :mojeek:<p><span class="h-card"><a href="https://mastodon.chriswiegman.com/@chris" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>chris</span></a></span> hope springs eternal. My big win of finally getting rid of authy, increased prevalence of sites that allow <a href="https://fosstodon.org/tags/yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikeys</span></a>, <a href="https://fosstodon.org/tags/solus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>solus</span></a> coming back alive, cool distros like <a href="https://fosstodon.org/tags/Bohdi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bohdi</span></a>, companies like <a href="https://fosstodon.org/tags/system76" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>system76</span></a>, and search engines likes <a href="https://fosstodon.org/tags/mojeek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mojeek</span></a> are so cool and make me happy.</p><p><span class="h-card"><a href="https://fosstodon.org/@Solus" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Solus</span></a></span> <span class="h-card"><a href="https://fosstodon.org/@system76" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>system76</span></a></span> <span class="h-card"><a href="https://mastodon.social/@Mojeek" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Mojeek</span></a></span> <span class="h-card"><a href="https://infosec.exchange/@yubico" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>yubico</span></a></span></p>
TobTobXX<p>Oooooh yeah. I wanted to set up <a href="https://fosstodon.org/tags/FDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FDE</span></a> again, but just saw a guide to do FDE with <a href="https://fosstodon.org/tags/yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikeys</span></a>. </p><p>Yess!!!</p>
Adam<p>How is it different from other hardware security thingies you may know?</p><p><a href="https://hax0rbana.social/tags/Yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Yubikeys</span></a> don't store passwords and are not open source. They do <a href="https://hax0rbana.social/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a>, which <a href="https://hax0rbana.social/tags/Signet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signet</span></a> does not.</p><p><a href="https://hax0rbana.social/tags/Nitrokeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nitrokeys</span></a> store 0 to 16 passwords (depending on the model). Signet can store hundreds of passwords. Nitrokeys do things like email encryption and <a href="https://hax0rbana.social/tags/FIDO2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FIDO2</span></a> (depending on the model), which Signet does not.</p><p>The <a href="https://hax0rbana.social/tags/Trezor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trezor</span></a> Model T does not store passwords. It does FIDO2 and holds your digital currencies.</p>
Royce Williams<p>Today the Yubico Blog announced general (consumer) availability of their new Security Key by Yubico.</p><p><a href="https://www.yubico.com/blog/expanded-security-key-series-now-available-phishing-resistant-fido-only-mfa-for-enterprises-and-individuals/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">yubico.com/blog/expanded-secur</span><span class="invisible">ity-key-series-now-available-phishing-resistant-fido-only-mfa-for-enterprises-and-individuals/</span></a></p><p>This is now the second set of keys to divert from the previous "black = full-featured YubiKey 5 Series" color scheme (the first being the YubiKey Bio FIDO Edition), these keys are visually very similar to the full YubiKey 5, but bear the word "FIDO" on the back to differentiate.</p><p>I think the YubiEnterprise-issued keys may be the only ones that will also bear a serial number?</p><p><a href="https://infosec.exchange/tags/yubico" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubico</span></a> <a href="https://infosec.exchange/tags/yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikeys</span></a></p>
Jeff Moss<p>Just want to give a positive shout out to <a href="https://defcon.social/tags/Putty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Putty</span></a> CAC SSH, the fork of Putty that gives you smart card support and works with <a href="https://defcon.social/tags/YubiKeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YubiKeys</span></a>. Good stuff!</p><p><a href="https://github.com/NoMoreFood/putty-cac" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/NoMoreFood/putty-ca</span><span class="invisible">c</span></a></p>
Gracjan Nowak<p><a href="https://ieji.de/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> has announced they’re finally adding an option of <a href="https://ieji.de/tags/EndToEndEncryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndToEndEncryption</span></a> for iCloud Drive, iCloud Backup and Photos, amongst other things. They’ll also add support for hardware security keys (including <a href="https://ieji.de/tags/Yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Yubikeys</span></a>) for Apple ID accounts. It’s huge and unexpected news. <a href="https://www.apple.com/newsroom/2022/12/apple-advances-user-security-with-powerful-new-data-protections" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">apple.com/newsroom/2022/12/app</span><span class="invisible">le-advances-user-security-with-powerful-new-data-protections</span></a> <a href="https://ieji.de/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://ieji.de/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Matt Knight<p>I may have had to physically intercept the <a href="https://mastodon.knight.fyi/tags/royalmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>royalmail</span></a> <a href="https://mastodon.knight.fyi/tags/postman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postman</span></a> but my new <a href="https://mastodon.knight.fyi/tags/yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikeys</span></a> have finally arrived! Now the dilemma - do I go with <a href="https://mastodon.knight.fyi/tags/ed25519" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ed25519</span></a> keys supported by my <a href="https://mastodon.knight.fyi/tags/yubikey5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikey5</span></a> or stick with <a href="https://mastodon.knight.fyi/tags/rsa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rsa</span></a> as supported by my other three <a href="https://mastodon.knight.fyi/tags/yubikey4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikey4</span></a> keys? <a href="https://mastodon.knight.fyi/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.knight.fyi/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.knight.fyi/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.knight.fyi/tags/pgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pgp</span></a></p>
mogwai<p><span class="h-card"><a href="https://fosstodon.org/@thewk" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>thewk</span></a></span> I bought two <a href="https://fosstodon.org/tags/yubikeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikeys</span></a> a few months ago on a gift certificate I got at work. I have to say that I'm very pleased with them. Especially the fact that they can store my PGP private keys and that I can use them through NFC on my phone. In fact, I think I use them more often on the phone than on the PC.</p>