Updated Security Tokens (markdown)

Dominik Schürmann 2018-10-04 02:29:06 +02:00
parent b25f18a7c7
commit a08f10e042
1 changed files with 7 additions and 1 deletions

@ -25,7 +25,13 @@
Roughly every third key generation on card fails with all tested smart cards and YubiKey NEO. For more details see our [research paper](https://www.ibr.cs.tu-bs.de/papers/schuermann-imwut2017.pdf). OpenKeychain currently generates keys on the smartphones and then moves them to the card.
## Are external USB Smartcard Reader supported?
Not officially. However, you can turn on "Allow untested USB Devices", under experimental settings and try your reader. It must have a CCID interface and you should insert the OpenPGP card before plugging in the reader. We found that Nexus 5X reboots, but Nexus 6P works. Readers on [this page](https://pcsclite.alioth.debian.org/ccid/supported.html) will work with higher probability but we cannot provide any recommendations, we still recommend one of the supported security tokens from the table above. Some discussions about this is in [#1912](https://github.com/open-keychain/open-keychain/issues/1912)
Not officially. However, you can turn on "Allow untested USB Devices", under experimental settings and try your reader.
* It must have a CCID interface and you should insert the OpenPGP card before plugging in the reader.
* We found that Nexus 5X reboots, but Nexus 6P works.
* Readers on [this page](https://pcsclite.alioth.debian.org/ccid/supported.html) will work with higher probability but we cannot provide any recommendations.
* Some discussions about this is in [#1912](https://github.com/open-keychain/open-keychain/issues/1912)
* One user reported that it works fine with "ACS ACR39U-NF PocketMate II Smart Card Reader (USB Type-C)"
## No OpenPGP support
These security tokens do not support OpenPGP: