Key Points
Key Takeaways
- 1
From Memory (Password) to Possession (Key)
- 2
Passkey: Democratization of public key cryptography. Because secret information is not passed to server, leakage risk becomes zero
- 3
YubiKey 5C NFC: Physical 'Duplicate Key'. Just insert into USB port of PC and touch with finger to exercise sudo authority
- 4
Network Isolation: Do not publish home server to Internet with Tailscale, access only via VPN
- 5
Analog Backup: Print QR code and recovery code, and put in safe. This is strongest backup
Introduction: The Death of Passwords
Flow of “脱 Password” started from around 2024 was completed in 2026.
If you still remember password like CorrectHorseBatteryStaple, you are late.
Authentication of engineer shifted completely from “Thing you know (Password)” to “Thing you have (Device)”. It is Passkey based on FIDO2/WebAuthn standard that realizes this.
1. Hardware: Physical “Origin of Trust”
Security of only software is broken if infected with malware. Hardware security key (YubiKey) does not put secret key out of device, so key itself is safe even if PC is taken over.
Yubico YubiKey 5C NFC
World standard hardware key. Just insert into USB-C and touch, can pass 2-step verification of Google, GitHub, AWS etc. Because NFC compatible, can authenticate by touching back of iPhone.
Kensington MagPro Privacy Screen
Essential manner of engineer working in cafe. Peep prevention filter detachable with magnet. Looks clear from front, but looks pitch black from next seat (Viewing angle 30 degrees).
2. Network: Anywhere “Home LAN”
Free Wi-Fi in cafe is dangerous? It is story of past. Now use Tailscale and pass all communication to encrypted overlay network (WireGuard).
Tailscale + Exit Node
If set home Raspberry Pi or Apple TV to “Exit Node”, access from outside becomes all via home IP. By this, can access in-house system with IP restriction safely.
# Execute on home server
sudo tailscale up --advertise-exit-node
NextDNS
Firewall at DNS level. Not only advertisement block, but also access to known phishing site and malware distribution domain is blocked at stage of DNS resolution. By linking with Tailscale, can make go through NextDNS even with mobile line.
3. Workflow: Integration to Development Flow
YubiKey is not just tool for Web login. Demonstrates true value by incorporating into daily work of developer (Git, SSH).
Git Commit Signing
It is already manner to put “Verified” badge on GitHub commit log. To prevent others from spoofing email address and committing (Spoofing), sign with OpenPGP key in YubiKey.
# ~/.gitconfig
[user]
signingkey = <YubiKey-GPG-Key-ID>
[commit]
gpgsign = true
SSH with YubiKey (FIDO2)
Since OpenSSH 8.2, became able to treat FIDO2 key directly as SSH key.
# Key generation (Secret key is generated in YubiKey and cannot be taken out)
ssh-keygen -t ecdsa-sk -O resident
By this, touch to YubiKey is required every time at server login. You may think “Troublesome”, but this is strongest defensive wall “Malware cannot SSH arbitrary”.
4. Software: Passkey Manager
Passkey is tied to device, but it is painful to register again every time replace PC. So, use manager that can synchronize Passkey with cloud.
| 項目 | 1Password | Bitwarden |
|---|---|---|
| Passkey Sync | Perfect | Supported |
| SSH Agent Link | SSH unlock with fingerprint | CLI integration available |
| Price | $2.99/mo- | Free / $10/yr |
| Code Base | Proprietary | Open Source |
Recommend 1Password for engineers.
Especially “SSH Agent” function is powerful, no need to place ~/.ssh/id_ed25519 locally, risk of secret key leakage decreases drastically.
5. OS Hardening: Doubt Default Settings
Finally, raise defensive power of OS itself.
- FileVault / BitLocker : Disk encryption is essential. Even if lose PC, data becomes same as garbage scrap.
- Lockdown Mode (Apple) : Ultimate defense mode. Minimize attack surface (Attack Surface) such as disabling JIT compiler and restricting preview of attachment file. Can respond to threat of level “Life is targeted”.
Deep Dive: The Essence of Zero Trust Architecture
Perimeter-based security, where “it’s safe once you’re inside the secondary network,” has collapsed. The principles of Zero Trust are simple:
- Never Trust, Always Verify: Even for access from within the same LAN, verify the health of the device and the authentication of the user every time.
- Least Privilege: Give only the minimum necessary privileges for the necessary amount of time.
- Assume Breach: Operate on the premise that you have already been breached to minimize damage (segmentation).
Engineers prefer tools like Tailscale because they allow for building this advanced Zero Trust environment at an individual level without complex VPN settings.
Conclusion: Security is “Habit”
Action to touch YubiKey, action to turn on Tailscale. By incorporating these into daily routine, can maintain highest level security without consciousness. When attacker targeted your data, if make think “This guy is troublesome (Cost does not pay)”, it is your win.

![[2026 Latest] Strongest AI Coding Tool Comparison: Who Wins the Agentic AI Era?](/images/ai-coding-tools-2026.jpg)



![Complete Guide to What You Can Do with Discord Bots [Latest 2026]](/images/discord-bot-guide-2026.jpg)
⚠️ コメントのルール
※違反コメントはAIおよび管理者により予告なく削除されます
まだコメントがありません。最初のコメントを投稿しましょう!