A slightly similar idea -- bitcoins wallet:

http://www.bitcointrezor.com/

About "one more item to carry around" -- what about implementing of
such device as a common thing -- a wirst- or pocketwatch, for example?
Intellectual smart watches is a promising trend now and such hackable
gadget with a passwords/crypto coins safe/wallet functionality may be
interesting.

Apropos, what do you think about possibility NFC support?

BW
--Oleg

On Sat, Sep 7, 2013 at 3:13 AM, EdorFaus <[email protected]> wrote:
> On 09/06/2013 07:18 PM, Werner Almesberger wrote:
>>
>> I've been thinking for a long time about making a portable password
>> safe device. I originally thought of using the Ben for such a purpose,
>> but it has some properties that would be undesirable for such a role.
>>
>> I wonder if there may be interest in building a small computer
>> designed specifically for such a purpose. Besides such a project being
>> highly Zeitgeist-compatible, I think we now also have accumulated
>> enough skills and know-how to actually be able to make it happen.
>
>
> I like this idea.
>
> It could be improved by also supporting things like ssh private keys, but I
> assume that doing that would be far more complex than only supporting
> passwords, so it is best left for a later version.
>
>
>
>> The device would have a small display, a (tiny) keyboard, USB host
>> and USB device, and RF (802.15.4, to keep things simple and cheap).
>
>
> This made me think of another (fairly recent) RF standard I've been
> interested in, named DASH7 - it's optimized for very low power operation,
> and bursty transmissions (which should be fine for this kind of use), and
> there's an open-source RTOS-based implementation[1] that helped to shape the
> standard.
>
> I haven't actually done any real work with it yet though, so I don't know if
> it would actually be a good fit here.
>
> [1]: https://github.com/jpnorair/OpenTag
>
>
>
>> USB device would be used for a HID device to "type" things to a PC.
>> The source of such keystrokes would be a) an account record, b) the
>> device's keyboard, c) a keyboard connected via USB host.
>
>
> I did some work on reading characters from a USB HID keyboard recently
> (well, an emulated one technically, kinda like this device), and the
> experience taught me some things that are worth being aware of.
>
> Most importantly for this use case, is that the USB HID keyboard protocol
> does not allow for sending characters at all.
>
> It only allows for sending keypresses (and releases), which is not quite the
> same thing, as that only tells you which key (or combo) was pressed, not
> what character was printed on that key.
>
> This means that the device needs to know which keyboard layout is in use on
> the PC it is talking to, and the keyboard protocol doesn't give it that
> info.
>
> Now, *most* people use a QWERTY keyboard, which usually has the most
> important keys in the same places across the various national variants
> (specifically A-Z and 0-9), so we could just limit ourselves to those (at
> least per default), but that means we can't use any "special" characters
> (like minus or colon) in the passwords.
>
> That's not really a good idea, as having complex passwords is one of the
> main reasons to have a password safe in the first place.
>
> One potential workaround for this would be to not use a built-in keyboard,
> but use whatever keyboard you would normally use to enter the passwords -
> just connected to the device instead - then the device could just save the
> keystrokes instead of the corresponding characters.
>
> Unfortunately, there's several problems with that workaround, which makes it
> far less than ideal, e.g. consider what happens if you move to a different
> PC with a different keyboard layout, or simply want to show the password on
> the device's screen.
>
> So, just to reiterate, the only real solution (that I know of, and that
> doesn't require custom driver installation) is to make the device aware of
> which keyboard layout is in use.
>
> The easiest way to do that would probably be to make a setting for it.
>
>
>
>> Instead of a USB device, the password safe could also use RF to send
>> the (encrypted and traffic-shaped) keystrokes. USB host would in this
>> case also be used to "pair" (set up a shared secret) RF dongles with
>> the password safe.
>
>
> I assume the RF dongle would, again, appear as a keyboard to the host?
> Basically making the RF part just a replacement for the USB cable?
>
>
>
>> Does that sound useful ?
>
>
> It does to me.
>
> I'm not sure how much I'd use such a device myself (maybe, maybe not - I do
> have a software equivalent at work, but mostly for the ones I use rarely,
> and notes on each), but I'm hardly typical. Even if the final device ends up
> not seeing much use, though, I still think it sounds like a useful project,
> even if only as a learning experience (or to prove that we can do it).
>
> It needs to be reliable, though - this means that it must work when it's
> needed, and it needs to have a long battery life.
>
> Even if it's a common battery type and they're easily replaceable, noone
> wants to swap out batteries often, and especially not in something like
> this.
>
> Regards,
> Frode Austvik
>
>
> _______________________________________________
> Qi Hardware Discussion List
> Mail to list (members only): [email protected]
> Subscribe or Unsubscribe:
> http://lists.en.qi-hardware.com/mailman/listinfo/discussion

_______________________________________________
Qi Hardware Discussion List
Mail to list (members only): [email protected]
Subscribe or Unsubscribe: 
http://lists.en.qi-hardware.com/mailman/listinfo/discussion

Reply via email to