| Nov | DEC | Jan |
| 16 | ||
| 2019 | 2020 | 2021 |
COLLECTED BY
Collection: github.com
Add a deprecation message to the top of `README.md`.cac9e72
Soft U2F is a software U2F authenticator for macOS. It emulates a hardware U2F HID device and performs cryptographic operations using the macOS Keychain. This tool works with Google Chrome/Chromium, Safari, Firefox and Opera's built-in U2F implementations.
We take the security of this project seriously. Report any security vulnerabilities to the GitHub Bug Bounty Program.
$ launchctl unload ~/Library/LaunchAgents/com.github.SoftU2F.plist
Delete the launch agent plist
$ rm ~/Library/LaunchAgents/com.github.SoftU2F.plist
Delete the .app
$ sudo rm -rf /Applications/SoftU2F.app/
Unload the kernel extension (this may fail if a browser is still talking to the driver. Deleting the .kext and restarting the system will fix this)
$ sudo kextunload /Library/Extensions/softu2f.kext
Delete the kernel extension
$ sudo rm -rf /Library/Extensions/softu2f.kext
Tell macOS to forget about the installation
$ sudo pkgutil --forget com.GitHub.SoftU2F
Done
# Install Commaned Line Tools xcode-select --install # Build softu2f.kext and SoftU2F.app. script/build
https://demo.yubico.com. When the low-level U2F authenticator receives a request to register/authenticate a website, it doesn't receive the friendly app-ID string. Instead, it receives a SHA256 digest of the app-ID. To be able to show a helpful alert message when a website is trying to register/authenticate, a list of app-ID digests is maintained in this repository. You can find the list here. If your company's app-ID is missing from this list, open a pull request to add it.
/inc, which are included with their own licenses.