FB pixel

Maker builds FIDO2-compliant LionKey USB dongle for passwordless security

Maker builds FIDO2-compliant LionKey USB dongle for passwordless security
 

With their fiddly and indirect nature, one-time passwords (OTPs) are a curse of modern life. They’re a security risk and outdated. Frustrated, a maker has built a physical security key that’s compliant with FIDO2.

Engineer Aleksei Karavaev has shown off a compact USB dongle designed to host the open-source LionKey firmware, transforming it into a dual-USB FIDO2 security key for both mobile and desktop environments.

The device supports universal second-factor authentication and passwordless login, offering an alternative to proprietary hardware such as YubiKey.

Karavaev said the project was motivated by frustration with CAPTCHAs and OTP codes, alongside a desire for transparency in hardware security. He commented, “I didn’t really want to use a YubiKey because it’s closed-source, and I prefer to own things I understand and can verify.”

While SoloKeys offered an open-source option, Karavaev noted the lack of dual-USB solutions and his preference for firmware written in C rather than Rust. While Karavaev may not be too fond of Yubico’s YubiKey, the Ukrainian army has found them rather useful.

The dongle builds on LionKey firmware originally developed by Martin Endler as part of his master’s thesis. Karavaev’s design integrates an STMicroelectronics STM32H533 microcontroller, chosen for its enhanced cryptographic capabilities compared to the STM32L432 used in SoloKey, the maker explained.

The PCB features a USB Type-C connector at one end and an extended edge-connector for USB Type-A at the other, ensuring compatibility across smartphones, tablets and legacy devices. A shine-through RGB LED and experimental pins add flexibility for further development.

LionKey functions as a WebAuthn roaming authenticator, supporting CTAP 2.1 over USB 2.0 (CTAPHID). It enables PIN-based user verification and can store passkeys (client-side discoverable credentials).

Written in C without dynamic memory allocation, the firmware is optimized for resource-constrained environments and can be ported across different MCUs. The reference implementation runs on the NUCLEO-H533RE board with hardware-accelerated cryptography.

The project is documented on Hackaday.io, while the LionKey firmware is available on GitHub under the MIT license.

Related Posts

Article Topics

 |   |   |   |   |   |   |   | 

Latest Biometrics News

 

MOSIP delves into biometric data quality considerations

Biometric data quality was in focus at MOSIP Connect 2026 in Rabat, Morocco, from policies for ensuring good enrollment practices…

 

NIST nominee pressed on AI standards, facial recognition oversight

The Senate Committee on Commerce, Science and Transportation on Thursday considered the nomination of Arvind Raman to serve as Under…

 

Trulioo’s Hal Lonas on how he applies aeronautics principles to fighting fraud

Rocket science is routinely held up as the ultimate example of a highly complex discipline. But Trulioo’s Hal Lonas found…

 

Vouched donates MCP-I framework to Decentralized Identity Foundation

An announcement from Seattle-based Vouched says it has formally donated its Model Context Protocol – Identity (MCP-I) framework to the…

 

California’s OS-based age verification law challenges open-source community

California’s new online safety bill, AB 1043 (the Digital Age Assurance Act), adopts a declared age model for operating systems….

 

87% of failed biometric verifications in Southern Africa due to AI spoofing: Smile ID

A new report spotlights deepfake fraud posing an acute problem for Africa. Digital identity, banking and e-government are being used…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events