Various links, hints etc in the security, privacy area

Web security


OATH-TOTP for Linux desktop login

Start with installing correct pam module:

sudo apt-get install libpam-google-authenticator

and then create an authentication token:


and edit corresponding display manager pam file:

✔ ~ 
23:15 $ sudo vim /etc/pam.d/lightdm

adding a google authentication just after common password:

23:29 $ cat /etc/pam.d/lightdm
auth    requisite
auth    sufficient user ingroup nopasswdlogin
@include common-auth
auth    optional
auth    optional
@include common-account
session [success=ok ignore=ignore module_unknown=ignore default=bad] close
#session required
session required
@include common-session
session [success=ok ignore=ignore module_unknown=ignore default=bad] open
session optional auto_start
session optional auto_start
session required readenv=1
session required readenv=1 user_readenv=1 envfile=/etc/default/locale
@include common-password
auth required nullok

Unfortunately, for some reasony google authentication was crashing with default kdm available for Ubuntu 14.04 Trusty. Since new release should be available in maximum two months - I have decided to give up idea of debugging it and swith to light temporarily.

List of security related frameworks

Multi factor authentication

List of hotp ready applications

Sailfish OS


U2F supported services list

OpenPGP Yubikey 4



OpenGPG applet installation for Yubico NEO

Some links for start

It is very likely that you will experience following error during any operation on your Yubico NEO key:

gpg: sending command `SCD PASSWD' to agent failed: ec=6.131

which means that your key is locked and you have to install latest opengpg-applet from here: which involves installation also gpshell and Global Platform libraries from here: Full information about building and installing applet can be found here:

Prebuild cap file can be also found here:

However, in my case it did not help and I have contacted support but also raised help question on the forum: