Permalink
Switch branches/tags
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
1004 lines (612 sloc) 65.1 KB
title tags keywords last_updated summary sidebar permalink folder
OnlyKey User's Guide
OnlyKey
User's Guide
OnlyKey, User's Guide
Nov, 10, 2018
The OnlyKey user's guide provides step-by-step instructions for configuring and using OnlyKey.
mydoc_sidebar
usersguide.html
mydoc

{% include image.html file="image50.png" %}

  USER'S GUIDE


Unpacking OnlyKey {#unpacking}

{% include callout.html content="Step 1. Remove the OnlyKey and Keychain from packaging." type="default" %}

{% include callout.html content="Step 2. Attach the provided keychain to your OnlyKey and insert OnlyKey into protective case." type="default" %}

{% include callout.html content="Step 3. (Optional) Check out OnlyKey accessories - color cases, keychain options, mobile adapter." type="default" %}

Proceed to setup below

Setting up OnlyKey {#initial-setup}

Install OnlyKey App {#app-install}

There are two options for installing the OnlyKey app.

Once you have installed the app proceed to OnlyKey Setup

Install OnlyKey Desktop App {#app-desktop}

{% include callout.html content="Step 1. Download installer" type="default" %}

macOS

Windows

Linux

{% include callout.html content="Step 2. Install and launch the app." type="default" %}

{% include tip.html content="You can ensure the integrity of your downloaded file by verifying the checksum.
macOS SHA 256 CHECKSUM: 486a5f8c8da82dfdf57dbe76b3343274c4e6bea4294db789b7c258788d353234
Windows SHA 256 CHECKSUM: af331256d79ae7d8aa522072ab35724c29cb7a3c83b25d61ccd7067ef4c8612f
Linux SHA 256 CHECKSUM: 4638ce8b21c66b6f414d937d08ba01917db3d20b050630e6b456c338ba1c9e06
" %}

Install OnlyKey Chrome App {#app-chrome}

{% include callout.html content="Step 1. Open the Chrome (or Chromium) Web Browser. If you do not have the chrome web browser installed you can install this by following the instructions here: https://www.google.com/chrome/browser/desktop/)" type="default" %}

{% include callout.html content="Step 2. Click here to browse to the OnlyKey Configuration Web app on the Chrome Web Store and select 'Add to Chrome'" type="default" %}

{% include image.html file="image41.png" %}

{% include callout.html content="Step 3. When prompted select ''Add App''" type="default" %}

{% include image.html file="image12.png" max-width="359" %}

{% include callout.html content="Step 4. To launch the OnlyKey Configuration App select the top right menu icon -> Bookmarks -> Show Bookmarks Bar to enable the bookmarks bar to become visible. Then select the Apps icon (Or alternatively browse to ''chrome://apps/'') and then select the ''OK'' icon to launch the OnlyKey App." type="default" %}

{% include image.html file="image33.png" max-width="544" %}

{% include image.html file="image17.png" %}

OnlyKey Setup {#onlykey-setup}

{% include callout.html content="Step 1. Insert OnlyKey and select [Next] to get started." type="default" %}

{% include tip.html content="Before setting a PIN

You may find it easier to remember a pattern rather than a 7 - 10 digit PIN. Kind of like patterns used to unlock a phone lock screen:" %}

{% include image.html file="image86.png" max-width="157" %}

{% include callout.html content="Step 2. Enter a PIN code on the OnlyKey Keypad, check the disclaimer box, and select [Next]." type="default" %}

{% include callout.html content="Step 3. Re-enter PIN code, and select [Next]." type="default" %}

{% include callout.html content="Step 4. Enter a PIN code for second profile, check the disclaimer box, and select [Next]." type="default" %}

{% include callout.html content="Step 5. If you wish to set a self-destruct PIN enter a PIN code, check the disclaimer box, and select [Next]." type="default" %}

{% include callout.html content="Step 6. Re-enter PIN code, and select [Next]." type="default" %}

{% include callout.html content="Step 7. Follow the instructions to enter a Backup Passphrase and select [Next]." type="default" %}

{% include callout.html content="Step 8. If you have an OnlyKey backup to restore, select [Choose File] and select your OnlyKey backup file and then select [Next] to load it onto your OnlyKey. If you do not have a backup just select [Next] to complete the setup." type="default" %}

Your device is now set up and will automatically reboot. You will be prompted to enter your PIN from now on when using the OnlyKey.

{% include tip.html content="***Forget your PIN?***

If you lose or forget your PIN then a factory default must be completed on your OnlyKey before you can set a new PIN. This wipes all of your sensitive information and allows you to go through the Setup again to configure a new OnlyKey PIN. To perform a factory default you have two options:

Method #1 - Enter your self-destruct PIN.

Method #2 - Enter 10 incorrect PINs. You will notice that after entering 3 incorrect PINs your OnlyKey is steadily blinking red. This is an intentional safeguard so that your OnlyKey will not be inadvertently wiped by repeatedly pressing buttons. You must remove and reinsert your OnlyKey and enter 3 more incorrect PINs. Repeat this until 10 incorrect PINs have been entered. The device will then have a solid green light on that indicates that it is ready to set up." %}

If you want to learn more about the Self-Destruct and Plausible Deniability features see the OnlyKey FAQ and the OnlyKey Features.

Proceed to setup accounts below

Set up accounts {#account-setup}

{% include tip.html content="Set aside some time to set up accounts as this can be time consuming the first time you set it up. After you configure your profiles once you won't have to do this again unless you add a new account. Think of all the time you will save not having to remember and type usernames, passwords, and getting your phone out to type codes etc. This is a huge time saver in the long run." %}

Configure Basic Login Info {#all-about-slots}

{% include callout.html content="Enter your PIN - After setup you are prompted to enter the PIN you set onto your OnlyKey six button keypad." type="default" %}

Now that your OnlyKey is unlocked you see this screen.

{% include image.html file="image31.png" %}

All About Slots {#all-about-slots}

The Slots area of the application is where you will set up things like your usernames, passwords, and 2 factor. As you can see the word ''empty'' is shown 12 times next to a button with a number and a letter. Each of these buttons refer to one of the slots on your OnlyKey.

What are slots? On the OnlyKey you have 6 buttons and 12 available slots in each profile. Each slot can be set with a Label, URL, Username, Password, and two-factor authentication. Each slot is assigned to a button on your OnlyKey. So for example if you were to save your Google password to slot 1a, then to type out your Google password you would tap button 1 on your OnlyKey for less than one second (Slot 1a). If you were to save your Yahoo password to slot 1b, then to type out your Yahoo password you would hold button 1 on your OnlyKey for more than one second (Slot 1b).

Each button has two slots assigned to it that can be activated by holding the button for less than or more than one second.

The slots that have not been configured have no label so they are shown as ''empty''. Next, let's set a label to slot 1a.

Set a Label {#set-a-label}

{% include callout.html content="Step 1. Click the 1a button in the OnlyKey app and see the Slot 1a Configuration" type="default" %}

{% include callout.html content="Step 2. Enter a label such as Gmail in the Label field, check the box next to Label, and click Submit." type="default" %}

{% include image.html file="image36.png" %}

Now the label you entered is assigned to slot 1a. Slot labels are helpful if you forget which button is assigned to which account you can open the OnlyKey app at any time to see how it is set up.

{% include image.html file="image66.png" %}

OnlyKey On-The-Go {#otg}

What if I am using a computer without the OnlyKey app?

This is where the card you received with your OnlyKey comes in handy. You can write your labels on this and carry this in your wallet. This is a low tech solution but it works great.

{% include image.html file="card.jpg" max-width="400" %}

Also, as mentioned on the card you can hold down the 2 button on OnlyKey for 5+ seconds and OnlyKey will type out your slot labels which may look something like this:

1a Google
2a Bank
3a Email
4a VPN
5a School
6a U2F
1b Amazon
2b Dropbox
3b
4b
5b
6b Lastpass

{% include important.html content="Obviously, no sensitive information should be written on the card or saved to your slot labels. Just something that helps you remember which account is assigned there. Next, let's assign a username and password to slot 1a." %}

Set up a Slot {#set-up-a-slot}

The example configuration shown below would be to set up a username and password to automatically login to the Google page shown below.

{% include image.html file="image35.png" max-width="602" %}

{% include callout.html content="Step 1. To configure OnlyKey to log into the example Google page, Click the 1a button in the OnlyKey app, click the checkboxes and enter values as shown:" type="default" %}

{% include image.html file="image24.png" max-width="602" %}

{% include callout.html content="Step 2. Click submit to save the configuration to OnlyKey:" type="default" %}

Now the configuration is saved and shows up in the OnlyKey app as ''Google 1''

{% include note.html content="Since not all Login pages are the same OnlyKey has options like tab (use to go to the next field) and Return (submit). These essentially press either the tab or return key so if you are unsure of how to set up your OnlyKey configuration try logging into your login page first by using just your keyboard. For the example above you would do this by entering your username, pressing the Return/Enter key, on the next page entering your password and then pressing the Return/Enter key to complete your login." %}

Test a Slot {#test-a-slot}

Once you set your desired account information to a slot then try it out by going to the login page, clicking in the login field, and pressing the corresponding button on the OnlyKey.

Common issues:

  • The password is entered before page loads.
    • Set the delay, usually 2-3 seconds works well but this may not be enough time for slow web pages or slow internet connections.
  • There is a Captcha required sometimes after password
    • You can either set the delay to a high value like 8 - 9 seconds to give yourself time to enter this or select None. Selecting None means that the password is entered but not submitted so you have time to enter additional information.
  • Everything works fine but I really wish it typed faster.

As mentioned earlier, login pages can be different between sites and sometimes even different on the same site. For the second example we will set up another Google login, this one for a Google account where the username is already saved to the website so all you need to do is enter a password. This is the default when you have already logged into Google in the past on a computer.

Additionally, by using the URL field we can have the OnlyKey type the login page URL into the browser and browse to the login page (in this case accounts.google.com). This way a one-touch login is possible. Just select the empty URL field in the browser and the URL is automatically typed out and Return is pressed to browse to the site. Once on the site the password is entered and the login is complete.

{% include tip.html content="Using the URL field provides protection against spear phishing attacks as this provides assurance that the site you are entering your password into is the legitimate site. For example, if you receive an email asking you to log into your account to verify something instead of clicking the link in the email to login you would use OnlyKey to browse to the correct site to login.
Need a URL longer than 56 characters? Try using a URL shortner like Bit.ly" %}

The example configuration shown below would be to set up a URL and password to automatically login to the Google page shown below. Notice that the username is already remembered by the website, so there is not a need to set this in the OnlyKey slot.

{% include image.html file="image72.png" max-width="624" %}

{% include image.html file="image23.png" max-width="602" %}

These examples illustrate how to use OnlyKey in two real world scenarios. A key takeaway here is that you can configure OnlyKey to automatically do what you would normally do manually. Any combination of the fields shown in the slot configuration may be used or not used to fit login format.


*The table below shows how to configure some common login forms that at first may seem problematic.*
Login Format Configuration
Site that does not automatically select username field after loading page (i.e.Kracken). {% include image.html file="image42.png" max-width="201" %} With URL - You will notice that "Tab before UserName" is checked. This will select the username field as it is not automatically selected when the page loads. {% include image.html file="image54.png" max-width="395" %} Without URL - Browse to the login page first and place cursor in the username field before selecting the assigned OnlyKey button. {% include image.html file="image4.png" max-width="395" %}
Site where username is remembered after first login (i.e. Google). Password and 2FA only - This is usually the best option if you remember your username/email address as this will work on any computer whether your username is remembered or not. This method does not include URL in case you are prompted for a password. {% include image.html file="image60.png" max-width="395"%} Username Remembered w/URL - If you use your device mostly on a computer where you username is remembered this is a good option. If you use this configuration on a computer where username is not remembered then you must output of the login information into notepad and paste into login fields. {% include image.html file="image61.png" max-width="395" %}
Site that does not automatically select OTP code field (i.e. Salesforce) {% include image.html file="image22.png" max-width="201" %} After loading next page {% include image.html file="image47.png" max-width="201" %} You will notice that "Tab before OTP" is checked. This will select the OTP field as it is not automatically selected when the page loads. {% include image.html file="image44.png" max-width="395"%}
Site where username and password is required first and then OTP code field appears below (i.e. IT Glue) {% include image.html file="image28.png" max-width="207"%} {% include image.html file="image52.png" max-width="395" %}

{% include tip.html content="Before testing a configuration in your web browser it is a good idea to try it out in a text editor like notepad, just to make sure it looks right. The last thing you want is to find that you accidentally are typing your password out in the wrong field and now have to change the password." %}

{% include important.html content="NO WEAK PASSWORDS - While OnlyKey makes it possible for your accounts to be more secure than remembering passwords or than using a software password manager one thing to remember is that it is up to you to use strong passwords. If you set your password to something like ''password1'' this is not secure, in fact we recommend using randomly generated strong passwords that cannot be guessed or cracked by a hacker." %}

Generating a strong password is easy to do. Next, let's use two different methods to generate strong uncrackable passwords.

Generate Strong Password via Browser Extension {#generate-strong-password-via-browser-extension}

Install a browser extension by selecting add to Chrome the same way that you installed the OnlyKey app.

Chrome Extension available from the Chrome Web Store here.

{% include image.html file="image21.png" %}

Generate Strong Passwords Online {#generate-strong-passwords-online}

There are many websites that allow you to generate a secure random password including the Lastpass tool.

LastPass password generation tool available here.

{% include image.html file="image59.png" %}

Configure Two Factor Authentication (2FA) {#two-factor-authentication-2fa}

Two-factor authentication (2FA) is essentially an extra step that is required during the login process that makes it so that even if your username and password are compromised an attacker cannot login to your account. It is called two-factor authentication, or sometimes also multifactor authentication, because more than one factor is required to login. Factors can be something you know like a password, something you are like a fingerprint or iris scan, or something you have like the OnlyKey. There are three different types of 2FA supported by OnlyKey. By supporting multiple modes of 2FA OnlyKey will work with most sites that support 2FA - http://www.dongleauth.info/

Google Authenticator (TOTP) {#google-authenticator-totp}

DISCLAIMER - Google® is the registered trademarks of Google Inc. OnlyKey is not associated with or sponsored by Google® Inc.

{% include tip.html content="If you are not a 2FA guru then this is the recommended method to use." %}

Background Information

The way you would typically set up Google Authenticator without OnlyKey is to download the Google Authenticator app to your smartphone. You would then enable Google Authenticator on a website and the website would provide you with a QR code that looks like this:

{% include image.html file="image84.png" max-width="550" %}

You would then take a picture of the QR code the website gives you. The app then starts generating a 6 digit number that changes every 30 seconds that is required to be typed into the website login prompt in addition to your username and password.

This method of two-factor authentication has some notable advantages over using features like 2nd-step verification where a website will send you an SMS message with a code to enter to login. One weakness in the SMS approach is that phone numbers can be transferred to a malicious party sometimes just by calling and asking the phone company to do this and providing some personal information. Another weakness is that more sophisticated attackers may be able to clone your phone number and then receive SMS messages sent to you. Google authenticator (TOTP) solves some of these issues by generating the code on your phone itself using a private key. Now that the background is covered we can set this up on your OnlyKey. No phone or app required for setting this up on your OnlyKey but if you wish to maintain a backup of your two-factor authentication codes it may be a good idea to download the app and scan the QR code as a backup in case you lose your OnlyKey.

{% include callout.html content="Step 1. Enable Google Authenticator App on Website - If you are unsure if the website you want to setup supports OTP check here. Assuming that the website supports Google Authenticator you can proceed to enable Google Authenticator. For example to do this for your Google Account you must first enable 2-Step Verification and then you select ''SETUP'' as shown below:" type="default" %}

{% include image.html file="image85.png" max-width="582" %}

As you go through the steps you will be prompted to scan a QR code (Looks like a square bar code). You can go ahead and scan the QR code using your smartphone Google Authenticator app if you wish to create a backup and then select "CAN'T SCAN IT" as shown below:

{% include image.html file="image6.png" max-width="392" %}

{% include callout.html content="Step 2. Copy and Paste Code into app -

Selecting ''CAN'T SCAN IT'' will display the private code. Select this text and copy it as shown below:" type="default" %}

{% include image.html file="image38.png" max-width="383"%}

Now open the OnlyKey Chrome Configuration App. With your correct PIN entered on the OnlyKey you are able to select the Slot to configure and paste this code into the field located next to ''Google Auth OTP'' as shown below:

{% include image.html file="image65.png" max-width="599" %}

Once you click submit your OnlyKey is ready to generate OTPs.

{% include callout.html content="Step 3. Generate OTP - Place your cursor in the ''Enter code'' field and press the button that corresponds to the slot that was set. In the example above we set slot 2a so we press the #2 button to generate the OTP." type="default" %}

{% include image.html file="image20.png" max-width="339" %}

{% include image.html file="image75.png" max-width="324" %}

Once your account has been verified you are all set. You can add a username and password to this slot so that you can do a one touch login. Keep in mind that the page may take a second or two to load where your 6 digit OTP is entered so set the delay accordingly, 4 - 5 seconds delay should work in most cases.

{% include image.html file="image37.png" max-width="600" %}

If you are looking for step-by-step guides on setting up other popular sites with 2FA check out the guides here. Just as with the steps mentioned above, instead of scanning the QR code with an app, click "CAN'T SCAN IT" to copy and paste the text into the Google Auth OTP field of the OnlyKey app.

To find out if a specific website is supported there is a full list of websites and wether or not they support 2FA here. To see if a certain site is supported see that there is a check next to "One Time Passwords (OTP)"

Learn more about the implementation of Google Auth OTP here.

Google Authenticator OTP On-The-Go {#google-authenticator-otg}

One requirement of TOTP (Time-based One-time Password) is having the correct time. If OnlyKey is used on a system where the OnlyKey app is not running it will display "NOTSET" instead of the OTP code. Because OnlyKey has no battery it requires an app to send it the correct time to be able to generate TOTP codes. For this reason it is important to ensure the OnlyKey app is permitted to autostart.

However, OnlyKey TOTP will work on-the-go without the app running. All you have to do is browse to our web app https://apps.crp.to in Google Chrome or Firefox (With U2F Enabled). This web app in addition to being used to send encrypted messages sets the current time on OnlyKey and login with TOTP will function as normal.

{% include image.html file="totp.png" max-width="600" %}

Yubico® One-Time Password {#Yubico-one-time-password}

DISCLAIMER - Yubico® and Yubikey® are the registered trademarks of Yubico® AB. OnlyKey is not associated with or sponsored by Yubico® AB. Yubikey® OTP has been released by Yubico® as open source software with license found here

{% include tip.html content="The majority of Yubikey® OTP applications online require Yubicloud setup. See the Yubicloud setup section after setting up Yubico® OTP." %}

{% include image.html file="image43.png" %}

  • Select the ''Hide values'' checkbox and select ''Regenerate'' to create a Public Identify, Private Identity, and Secret Key.

{% include image.html file="image1.png" %}

  • Copy and paste these into the corresponding fields in the OnlyKey App (Advanced Tab).

{% include image.html file="image62.png" max-width="330" %}

  • Select ''Save to OnlyKey'' to write these values to your OnlyKey
  • Now your OnlyKey is ready to function in Yubikey® OTP mode
  • Just select a slot that you wish to use with Yubikey® OTP mode by selecting the radio button and then selecting ''Submit''. The Yubikey® OTP will be generated when the corresponding button is pressed.

{% include image.html file="image56.png" max-width="400" %}

The majority of Yubikey® OTP applications online require Yubicloud setup. See the Yubicloud setup section after setting up Yubico® OTP.

Learn more about Yubikey® OTP implementation here.

Yubicloud (Not Officially Support) {#yubicloud-not-officially-support}

Some online services use Yubicloud for authentication. Yubicloud is owned by Yubico® and 3rd party devices are not supported so OnlyKey is not supported on Yubicloud. However, 3rd party devices will technically work Yubicloud as long as you own an actual Yubikey®.

The following instructions show you how to set up a 3rd party device on Yubicloud. This is for your information only and we do not recommend setting up a 3rd party device on Yubicloud. If you choose to follow this information to set up a 3rd party device on Yubicloud you choose to do so against our recommendations and at your own risk.

{% include callout.html content="Step 1. Download and install the Yubikey® personalization tools" type="default" %}

{% include callout.html content="Step 2. Go into Yubico® OTP and select ''Quick''" type="default" %}

{% include callout.html content="Step 3. Insert Yubikey®, select a configuration slot, and click ''Write configuration'' button" type="default" %}

{% include image.html file="image5.png" %}

{% include callout.html content="Step 4. Set the values shown in the Public Identity, Private Identity, and Secret Key to your 3rd party device." type="default" %}

{% include callout.html content="Step 5. Once this is complete select ''Upload to Yubico®''" type="default" %}

{% include callout.html content="Step 6. This will open a web browser, to complete the registration enter the OTP in the ''OTP from the Yubikey®'' field by pressing the button on your 3rd party device." type="default" %}

{% include image.html file="image46.png" %}

{% include callout.html content="Step 7. Once the form is complete enter the Captcha and select Upload AES key." type="default" %}

{% include callout.html content="Step 8. Now you can test your OTP on the site https://demo.Yubico®.com/" type="default" %}

{% include image.html file="image51.png" %}

Security Key - Universal 2nd Factor (U2F) {#universal-2nd-factor-u2f}

{% include note.html content="U2F is supported on Google Chrome and Firefox. Firefox U2F support is not enabled by default. If using Firefox, U2F must be enabled by completing the following steps in your browser:

  • Type about:config into the Firefox browser.
  • Search for “u2f”.
  • Double click on security.webauth.u2f to enable U2F support.

    " %}

OnlyKey works just like any other U2F token. Follow the steps below to configure a slot to use U2F.

{% include callout.html content="Step 1. Select a slot that you wish to use with U2F mode by selecting the radio button and then selecting ''Submit''." type="default" %}

{% include image.html file="image34.png" %}

{% include callout.html content="Step 2. Go to the website that you wish to register a new security token and when you select to register a token you will notice the OnlyKey light flashing blue, on and off. Press the button corresponding to the slot you set to U2F in step 1 to register token." type="default" %}

{% include callout.html content="Step 3. Once registered, your token can be used to authenticate by pressing the button. You can also add username and password to this slot to have a one touch login." type="default" %}

{% include tip.html content="There are two ways to use U2F on OnlyKey:

1) Have one designated slot on OnlyKey for U2F. i.e. Set slot 6a as U2F and press button 6 to authenticate to an unlimited number of sites.

2) Have U2F enabled along with other account information for each site. i.e. Set slot 1a as Dropbox login and include URL, Username, Password, and U2F all in one profile like this:
U2F Example
Now you can register your security key by pressing button 1. But won't it type out my information while registering? No, while your device is flashing blue you can press the button to register and typing is disabled. Once your security key is registered you can log out and now you have a one touch login configured:
- Automatically type out and browse to login page (https://www.dropbox.com/login).
- Three second delay ensures login page has time to load, this can be increased if using slow internet connections.
- Username and password are entered in login field.
- Two second delay ensures security key page has time to load.
- U2F authentication completes automatically." %}

Learn more about OnlyKey's implementation of U2F here.

Using OnlyKey With A Software Password Manager {#using-onlykey-with-a-software-password-manager}

OnlyKey stores up to 24 unique accounts in offline storage and can be used to secure an unlimited number of accounts if used in conjunction with a software password manager. For example, set one of the OnlyKey slots to Dashlane, Google (Smart Lock), Lastpass, etc. enable 2-factor on this slot and then use your OnlyKey to unlock your software password manager. This way you can keep your most valuable accounts in offline storage and everything else in the software password manager.

{% include tip.html content="This way you can keep your most valuable accounts in offline storage and everything else in the software password manager." %}

LastPass {#lastpass}

LastPass supports both Google Authenticator and Yubico® OTP. Google Authenticator is supported in the free version of LastPass and Yubico® OTP is supported in the premium version of LastPass.

To protect LastPass account with Google Authenticator 2FA follow the steps below.

{% include callout.html content="Step 1. Go into Account settings-> Multi-factor Options and select the edit button in the Google Authenticator column." type="default" %}

{% include image.html file="image71.png" %}

{% include callout.html content="Step 2. Change to enabled and select View button next to Private Key" type="default" %}

{% include image.html file="image7.png" %}

{% include callout.html content="Step 3. You will be prompted to enter your master password and then the key is displayed." type="default" %}

{% include image.html file="image11.png" max-width="469" %}

{% include callout.html content="Step 4. Copy and paste the key into the Google Auth OTP field of the OnlyKey app for the slot that you want to set up." type="default" %}

{% include image.html file="image53.png" max-width="600" %}

{% include callout.html content="Step 5. Make sure to check the radio button next to Google Auth OTP and select Submit." type="default" %}

{% include callout.html content="Step 6. Go back to the LastPass app and select Update. You will be prompted for your password again and then your current verification code. Click inside the verification code box and press the button assigned to the slot you set up on your OnlyKey to type out the verification code." type="default" %}

{% include image.html file="image74.png" max-width="600" %}

{% include image.html file="image13.png" max-width="624" %}

{% include image.html file="image10.png" max-width="500" %}

DashLane {#dashlane}

DashLane supports Google Authenticator, Yubico® OTP, and U2F. The choice is yours but for beginners Google Authenticator is the best option.

Google SmartLock {#google-smartlock}

SmartLock is a new password manager that is available in Google Chrome. Since this uses a Google account it supports Google Authenticator or U2F. The choice is yours but for beginners Google Authenticator is the best option.

Secure Communication - Chat/Email {#secure-com}

OnlyKey is OpenPGP compatible and the worlds first plug and play encryption device. It is universally supported and does not require special software or drivers. With OnlyKey and Keybase you can truly send and receive secure messages anywhere.

How it works

OnlyKey has two apps for secure communication:

  1. WebCrypt is supported on Firefox and Google Chrome for sending secure messages right in the browser.

  2. BrowerCrypt is a Google Chrome Extension that allows you to highlight any text in the browser and encrypt it.

{% include note.html content="Private keys are not accessible to the app or to the browser. This is in contrast to for example PGP/GPG software, webmail (i.e. Protonmail), and smartphone apps. OnlyKey can only process secure messages when you tell it to by entering a 3 digit challenge code." %}

See Webcrypt in action

After configuring your OnlyKey following these instructions you can browse to the Webcrypt app to send secure messages.

  • Enter a message to encrypt {% include image.html file="encrypted-message.jpg" %}

  • Enter the shown challenge code on the OnlyKey (i.e. 1,5,2) {% include image.html file="encrypted-message2.jpg" %}

  • Encrypted message shown, by clicking the button again it will be copied to clipboard {% include image.html file="encrypted-message3.jpg" %} {% include image.html file="encrypted-message4.jpg" %}

  • Paste the message into any email or chat (Sending via Gmail shown) {% include image.html file="encrypted-message5.jpg" %}

  • When the recipient receives the message (email or chat) they can paste it into Webcrypt app to decrypt {% include image.html file="encrypted-message6.jpg" %}

  • Enter the shown challenge code on the OnlyKey (i.e. 2,2,1) {% include image.html file="encrypted-message7.jpg" %}

  • Decrypted message shown, if the sender signed the message you will see the sender's name (i.e. t) and their key ID. {% include image.html file="encrypted-message8.jpg" %}

  • By clicking the button again the message will be copied to clipboard {% include image.html file="encrypted-message9.jpg" %}

{% include note.html content="Messages sent via Webcrypt are never sent over the internet. The way it works is the necessary files are downloaded to your browser and all processing is done in your browser. Read more about Webcrypt security here" %}

See BrowserCrypt in action

BrowserCrypt is similar to WebCrypt but instead of pasting messages you can compose a message anywhere in the browser and then highlight and click to encrypt. Both BrowserCrypt and Webcrypt use the same method for encrypting messages but BrowserCrypt has some advantages including the ability to store the Keybase ID of recipients. These are stored in your local browser storage so there is no need to remember or lookup a recipient's name.

{% include warning.html content="Some websites may save a draft of your message automatically. For example, an email provider may save the message you are composing so that in case you close out of your email you can return to the message later. Keep this in mind when using BrowserCrypt, if you are concerned that your messaging provider may be able to read or save draft messages then use a secure composition window like Webcrypt." %}

  • Highlight the message to encrypt, select Encrypt, and select Encrypt for the recipient that you would like to send the message to (i.e. alicer) {% include image.html file="encrypted-message10.jpg" %}
  • Enter the shown challenge code on the OnlyKey and the encrypted message will be displayed

Find more information on BrowserCrypt here

Preferences {#preferences}

OnlyKey has several customizable preferences that can be accessed from the preferences tab of the configuration app.

{% include image.html file="image63.png" %}

Configurable Inactivity Lockout Period {#configurable-inactivity-lockout-period}

This is the amount of time that the OnlyKey should remain unlocked while not being used. The default value is 30 minutes and the maximum is 255 minutes (about 4 hours). To disable lockout altogether set the lockout to 0.

Configurable Keyboard Type Speed {#configurable-keyboard-type-speed}

Setting a custom type speed may be desirable in cases where the application you are using can not keep up with fast typing. Or if you don't use any applications with type speed restrictions you can have the text typed at top speed for the fastest logins. Setting value to 1 will result in very slow type speed of about one character a second, setting value to 10 will result in very fast type speed that will type almost instantly.

Configurable Wipe Mode {#configurable-wipe-mode}

Use Case #1 - If you are using the plausible deniability feature there is one scenario where an adversary may be able to determine that you were using the plausible deniability feature. This is possible if the adversary enters 10 incorrect PINs causing your OnlyKey to wipe all data and then they go to reconfigure the OnlyKey. The adversary would be able to determine during setup if the device has the Standard Edition firmware or the International Travel Edition firmware. At this point the device is wiped the adversary would not have access to any sensitive information but the adversary would know that your device is capable of encryption which in some areas may be undesirable. To address this issue you can set the wipe mode of your OnlyKey to Full Wipe. Given the same scenario with Full Wipe set when 10 incorrect PINs are entered the device will completely wipe all information including the firmware from your OnlyKey. No useful information would be available to an adversary concerning what firmware you were running and in order to use the device new firmware must be loaded.

Use Case #2 - You just like to be absolutely sure that everything including the firmware has been eliminated from your device when a factory default occurs.

Configurable Keyboard Layouts {#configurable-keyboard-layouts}

You can change your keyboard layout on the fly through the OnlyKey app preferences. Traveling to France from the US? No problem just set the OnlyKey keyboard to French and change it back to US when you return. Here are the options supported for international keyboards:

  • US_ENGLISH
  • CANADIAN_FRENCH
  • CANADIAN_MULTILINGUAL
  • DANISH
  • FINNISH
  • FRENCH
  • FRENCH_BELGIAN
  • FRENCH_SWISS
  • GERMAN
  • GERMAN_MAC
  • GERMAN_SWISS
  • ICELANDIC
  • IRISH
  • ITALIAN
  • NORWEGIAN
  • PORTUGUESE
  • PORTUGUESE_BRAZILIAN
  • SPANISH
  • SPANISH_LATIN_AMERICA
  • SWEDISH
  • TURKISH
  • UNITED_KINGDOM
  • US_INTERNATIONAL
  • CZECH
  • SERBIAN_LATIN_ONLY

SSH/PGP Challenge Mode {#challenge-mode}

By default, you must enter a 3 digit challenge code on OnlyKey to perform SSH or PGP operation. This is great for security but for some users a more convenient approach may be preferred. With challenge mode off, a physical press on any key is all that is required to perform the SSH or PGP operation.

Backup Key Mode {#backup-key-mode}

By default, you can change your backup key/passphrase at any time by entering your PIN to put the device in config mode. By setting backup key mode to locked, the backup key/passphrase may not be changed. This setting provides extra security so that even if an adversary has your PIN and has physical access to your device they would not be able to backup and restore your data.

Encryption Keys {#encryption-keys}

OnlyKey makes encryption keys easier and more secure by storing them offline, protected even if the computer using the key is compromised.

Key FAQ {#key-faq}

What is a key?

In the simplest terms an encryption key is something you have that allows you to encrypt data. This data could be emails, files, or anything really. Every time you browse to a secure website there are keys being used in the background to encrypt the information you send so that only you and the website can see the information.

Why does protecting private keys matter?

You may hear the term private key being used sometimes, we will not get into the details here but there are plenty of places to read further on this topic online. For our purposes here a private key is used to read the secure messages / data that someone sends you. Only you should have access to this key because anyone with access to the key can read all messages sent to you in the past or in the future. This is why it is important to protect the key from exposure and why storing it on the OnlyKey is better than on your computer somewhere. If it's on your computer and your computer is hacked then all past and future messages you send may be read by the hacker.

What does OnlyKey use keys for?

The OnlyKey stores private keys. These private keys are used for four different purposes.

  1. Secure Encrypted Backup - This will backup everything including your stored accounts, preferences, and other keys to an encrypted text file. For information on backing up OnlyKey see Secure Encrypted Backup.
  2. Secure Encrypted Messages (OpenPGP)
  1. SSH Authentication - SSH is a popular remote access tool that is often used by administrators. Thanks to the OnlyKey SSH Agent remote access can be passwordless and more secure. For information on using OnlyKey for SSH authentication see OnlyKey-Agent.

Learn more about keys feature here.

Generating Keys {#generating-keys}

{% include warning.html content="Only generate keys on a computer that you trust (i.e. never a publicly accessible or shared workstation)." %}

{% include callout.html content="Step 1. Go to https://keybase.io" type="default" %}

{% include callout.html content="Step 2. Select Login" type="default" %}

{% include image.html file="keybase1.jpeg" max-width="434" %}

{% include callout.html content="Step 3. Select Join Keybase" type="default" %}

{% include image.html file="keybase2.jpeg" max-width="434" %}

{% include callout.html content="Step 4. Enter an email address, username, and passphrase. This username will be used by others who want to send you encrypted messages. When finished select join." type="default" %}

{% include image.html file="keybase11.jpeg" max-width="434" %}

{% include callout.html content="Step 5. Select add a PGP key" type="default" %}

{% include image.html file="keybase3.jpeg" max-width="434" %}

{% include callout.html content="Step 6. Select I need a public key" type="default" %}

{% include image.html file="keybase4.jpeg" max-width="434" %}

{% include callout.html content="Step 7. Select Ok, got it" type="default" %}

{% include image.html file="keybase5.jpeg" max-width="434" %}

{% include callout.html content="Step 8. Enter Full name and at least one email. These will appear on the messages you send. When finished select Let the math begin." type="default" %}

{% include image.html file="keybase6.jpeg" max-width="434" %}

{% include callout.html content="Step 9. After the key is generated make sure to uncheck Host encrypted private key, too. Best security practices are to only keep your private key offline." type="default" %}

{% include image.html file="keybase7.jpeg" max-width="434" %}

{% include callout.html content="Step 10. Highlight your private key and copy to a text file. Save this to removable media like a USB flash drive or CD/DVD. You may want to make multiple copies as there is no way to recover this key if you lose it. Also ensure you write down your key passphrase (Same as Keybase account password) this is required to unlock your key. Store both in a physically secure location." type="default" %}

{% include tip.html content="A great physically secure location is a safe, preferably a fire safe." %}

{% include image.html file="keybase8.jpeg" max-width="434" %}

{% include image.html file="keybase9.jpeg" max-width="434" %}

{% include callout.html content="Step 11. Select Done, post to Keybase." type="default" %}

Now all that is needed to start sending encrypted messages is to load the key you generated onto your OnlyKey.

Proceed to Loading Keys below

Loading Keys {#loading-keys}

{% include warning.html content="Only load keys on a computer that you trust (i.e. never a publicly accessible or shared workstation)." %}

If you generated your keys as described in the Generating Keys section above proceed to follow the steps below. If not head over to Loading Keys Advanced.

{% include callout.html content="Step 1. Open the text file of your private key that you saved in the previous steps. Select all of the text of the private key (CTRL+A), and copy the text (CTRL+C)." type="default" %}

{% include image.html file="Keybase12.jpg" %}

{% include callout.html content="Step 2. Click on the Keys tab of the OnlyKey App." type="default" %}

{% include callout.html content="Step 3. Put the OnlyKey into config mode doing the following" type="default" %}

  • Ensure OnlyKey is unlocked
  • Hold the 6 button down for more than 5 seconds, and then release, you will see the light turn off.
  • Re-enter your PIN, you will see the OnlyKey LED fade in and out continuously (Red if OnlyKey Color) while in config mode.

{% include callout.html content="Step 4. Paste the copied private key into the RSA Private Key box. Ensure slot 1 is selected, the same passphrase you used with Keybase is entered as passphrase, Set as decryption key is selected. When finished select Save to OnlyKey" type="default" %}

{% include image.html file="loadkey1.jpeg" %}

{% include note.html content="Selecting set as backup key will use your Keybase key to encrypt backups. Setting this will override any previously set backup passphrase/key as there can only be one backup key set." %}

{% include callout.html content="Step 5. Select Subkey 1 and save" type="default" %}

You should see a message displayed indicating the key was successfully saved to OnlyKey.

{% include callout.html content="Step 6. Paste the copied private key into the RSA Private Key box again. Ensure slot 2 is selected, the same passphrase you used with Keybase is entered as passphrase, and Set as signature key is selected. When finished select Save to OnlyKey" type="default" %}

{% include callout.html content="Step 5. Select Subkey 2 and save" type="default" %}

You should see a message displayed indicating the key was successfully saved to OnlyKey.

Now your OnlyKey is ready to:

Loading Keys Advanced {#loading-keys-a}

{% include warning.html content="Only load keys on a computer that you trust (i.e. never a publicly accessible or shared workstation)." %}

If you did not generate keys using the Generating Keys steps provided or you already have an OpenPGP key that you would like to use there are some additional considerations.

  • OnlyKey supports RSA OpenPGP keys of sizes 2048 and 4096 (ECC Keys are not used for OpenPGP).
  • Decryption operations using a 2048 size key takes about 2 seconds, with 4096 size key it takes about 9 seconds (or up to 30 seconds with OnlyKey Original).

For best user experience we recommend using OnlyKey Color with 2048 key size (subkeys) for decryption and signing.

What are subkeys?

Each OpenPGP key is actually multiple keys. There is a primary key and subkey(s), for example when you follow the Generating Keys steps Keybase generates a key that has a 4096 key size primary key and two 2048 key size subkeys. The first subkey is used for decryption and the second subkey is used for signing.

Why does this matter?

You need to determine which keys to load to OnlyKey if you are generating your own key. Typically, if your key has two subkeys then subkey 1 is used for decryption and subkey 2 is used for signing.

If your key only has one subkey then the primary (master) key is typically used for signing and the subkey is used for decryption. This is the default for keys created with GnuPG and Mailvelope (OpenPGP.js).

Once you determine which key is your used for signing and which key is used for decryption:

  • Load the decryption subkey into slot 1 of OnlyKey and check "set as decryption key".
  • Load the signing primary/subkey into slot 2 of OnlyKey and check "set as signature key".

Digging Deeper into PGP

You can use gpg2 via terminal to check the key flags by using the following commands:

$ gpg2 --import /Downloads/asdf_priv.asc
gpg: key 86F9C12A016169E4: public key "asdf <asdf@asdf.com>" imported
gpg: key 86F9C12A016169E4: secret key imported
gpg: Total number processed: 1

$ gpg2 --with-colons --list-keys 86F9C12A016169E4
tru::1:1481922139:0:3:1:5
pub:-:4096:1:86F9C12A016169E4:1513980282:::-:::scESC::::::23::0:
fpr:::::::::37F75C777AEBB46FB690040986F9C12A016169E4:
uid:-::::1513980287::AB20A6F0D2D7FE2A9EFF4575C3FF7ED2DAC66F4A::asdf <asdf@asdf.com>::::::::::0:
sub:-:4096:1:8E6332B693FB6D8F:1513980282::::::e::::::23:
fpr:::::::::F5F80C91796859CEC6CB54768E6332B693FB6D8F:

In the shown example the flag 'e' (encryption) indicates that the first subkey is the decryption key. The flag 'sc' indicates that the primary key is the signing key

Exporting a key from GPG and Loading onto OnlyKey

{% include callout.html content="Step 1. Export the OpenPGP compatible private key from GPG" type="default" %}

$ gpg2 --export-secret-key -a "asdf"

% include callout.html content="Step 2. Click on the Keys tab of the OnlyKey App." type="default" %}

{% include callout.html content="Step 3. Put the OnlyKey into config mode doing the following" type="default" %}

  • Ensure OnlyKey is unlocked
  • Hold the 6 button down for more than 5 seconds, and then release, you will see the light turn off.
  • Re-enter your PIN, you will see the OnlyKey LED fade in and out continuously (Red if OnlyKey Color) while in config mode.

{% include callout.html content="Step 4. Copy and paste the private key into the RSA Private Key box. Ensure slot 1 is selected, the same passphrase you used with GPG is entered as passphrase, Set as decryption key is selected. If you wish to use your PGP to encrypt OnlyKey backups select Set as backup key (Note: If you previously set a backup passphrase and set this the PGP key will be used instead). When finished select Save to OnlyKey" type="default" %}

{% include note.html content="Selecting set as backup key will use your GPG key to encrypt backups. If you wish to use a different key for backups just load that key and set it as backup. There can only be one backup key set." %}

{% include callout.html content="Step 5. Select the decryption subkey and save" type="default" %}

You should see a message displayed indicating the key was successfully saved to OnlyKey.

{% include callout.html content="Step 6. Paste the copied private key into the RSA Private Key box again. Ensure slot 2 is selected, the same passphrase you used with GPG is entered as passphrase, and Set as signature key is selected. When finished select Save to OnlyKey" type="default" %}

{% include callout.html content="Step 5. Select the signing primary/subkey and save" type="default" %}

You should see a message displayed indicating the key was successfully saved to OnlyKey.

Secure Encrypted Backup Anywhere {#secure-encrypted-backup-anywhere}

The Secure Encrypted Backup Anywhere feature allows you to backup OnlyKey on the go. The way that this works is that the OnlyKey encrypts everything on your OnlyKey using an encryption key and then types it out. This allows saving the backup in a text file or email on any computer.

Backup With OnlyKey App {#backup-with-onlykey-app}

{% include callout.html content="Step 1. First, you must have a backup passphrase or key set on your OnlyKey." type="default" %}

{% include callout.html content="Step 2. Click on the Backup/Restore tab of the OnlyKey app." type="default" %}

{% include callout.html content="Step 3. Click inside the Backup data box and then hold down the 1 button on your OnlyKey for 5 seconds or more and then release. This will type out an encrypted backup of your OnlyKey configuration into the box. Select save file to save the backup file which has a timestamp so you can keep track of the latest backup file." type="default" %}

{% include image.html file="image78.png" max-width="650" %}

{% include tip.html content="Backup can take a long time if your Keyboard Type Speed is set to a low setting. To speed this up go to Preferences in the OnlyKey app and select a higher setting, 9 usually works well" %}

Backup Without OnlyKey App {#backup-without-onlykey-app}

The process is the same to backup without the app. OnlyKey can type out your encrypted backup anywhere.

Save to a text file - Instead of clicking in the Backup data box you could click into any text editor like notepad and when the backup is complete save the text file using whatever filename you prefer.

Save it in an email - In the same way you could also click into any email client and then when the backup is complete send the email to yourself or someone else.

Restore From Backup {#restore-from-backup}

Using the backup file created in the Secure Encrypted Backup Anywhere section, we can restore an OnlyKey from backup. This also allows restoring to a different OnlyKey or a second OnlyKey in order to have an extra.

{% include note.html content="The way that a restore works is that it overwrites the current information on your OnlyKey with the information stored in the backup. So if you for example have a backup file that contains a password in slot 1 and you do a restore to an OnlyKey that already has a username and password in slot 1 the result would be that the username would remain unchanged and the password would be overwritten." %}

{% include callout.html content="Step 1. Ensure that a PIN is set on the target OnlyKey by completing the Initial Setup section and ensure that the same passphrase/key is loaded onto the OnlyKey that was used to backup." type="default" %}

{% include callout.html content="Step 2. Put the OnlyKey into config mode by holding the 6 button down for more than 5 seconds, and then re-entering your PIN. You will see the OnlyKey LED fade in and out continuously (Red) while in config mode." type="default" %}

{% include callout.html content="Step 3. Click on the Backup/Restore tab of the OnlyKey App and then click Choose File to select your OnlyKey backup file. Click Restore to OnlyKey." type="default" %}

If you used the OnlyKey App to create the backup then the name of this file will be ''onlykey-backup-.txt''. The timestamp can be used to make sure you are loading the latest backup.

{% include image.html file="image45.png" %}

{% include callout.html content="Step 4. Restore may take a minute or two depending on the amount of data to restore. You will know that the restore is complete when the OnlyKey reboots automatically." type="default" %}

Loading OnlyKey Firmware {#loading-onlykey-firmware}

If you received a message in the OnlyKey app stating "This application is designed to work with a newer version of OnlyKey firmware." or if your OnlyKey has firmware v0.2-beta.6x or earlier follow the link below:

You can check firmware version by looking in the bottom right corner of the OnlyKey App.

{% include image.html file="version.png" %}

If your OnlyKey has firmware v0.2-beta.7x or later follow the instructions below to load OnlyKey Firmware.

Loading OnlyKey Firmware {#loading-onlykey-firmware-app}

There is an option in the app to load firmware when first setting up a new device. There is also a tab named Firmware in the app. This may be used to load the latest firmware onto OnlyKey directly through the app, no backup/restore or wiping is required. Firmware updates are securely signed using a simple blockchain and verified by on the OnlyKey.

  • Download the latest firmware here
  • Follow the instructions in the app to load firmware

OnlyKey Accessories / Mobile Support {#onlykey-accessories-mobile-support}

OnlyKey Case {#onlykey-case}

The OnlyKey case provides additional protection and lets you select a custom OnlyKey color. To put on the case just carefully slide the case over the OnlyKey as shown below:

{% include image.html file="image40.jpg" max-width="121" %} {% include image.html file="image80.jpg" max-width="292" %} {% include image.html file="image49.jpg" max-width="227" %}

Additional color cases are available - Choose a color that fits your style – Stealth Black, Guardian Blue, Hacker Green, Resistance Red, or Quantum White.

{% include image.html file="cases.jpg" max-width="500" %}

Purchase in OnlyKey Store

Purchase on Amazon

Android Support {#android-support}

Android is supported by using a USB on-the-go (OTG) adapter. There are two types of OTG adapters that can be purchased USB Micro and USB C.

Since the OnlyKey is essentially detected by Android as a keyboard, the username / password / Yubikey® OTP login features will work without any apps. With the OnlyKey Android app additional features like FIDO U2F, TOTP, and OpenPGP are supported. Get the app from Google Play here.

Purchase USB C to USB 3 OTG in OnlyKey Store {#usb-c-to-usb-3-otg-adapter}

{% include note.html content="Supports OnePlus2/3, Nexus 5X, LG G5, HTC 10 or other Android device with USB C and OTG support." %}

Purchase USB Micro to USB 3 OTG in OnlyKey Store {#usb-micro-to-usb-3-otg-adapter-with-keychain}

{% include note.html content="Supports Moto G5 Plus, Samsung Galazy S7 S6 S5 S4 S3 Note 2 Note, HTC One X, HTC One S, Moto G5, Moto X, or other Android device with USB Micro and OTG support." %}

iPhone/iPad Support (Experimental) {#iphone-ipad-support-experimental}

This is currently in the experimental phase so there is not official support. User's have claimed to successfully use OnlyKey on their iPhones using a USB adapter like the one shown below.

{% include image.html file="image29.png" max-width="248" %}

Purchase on Amazon from 3rd party seller

Since the OnlyKey is essentially detected by iPhone/iPad as a keyboard then the username / password / Yubikey® OTP login features will work. Unfortunately, there is no support for U2F or Google Authenticator currently.

Keychain Accessory Options {#keychain-options}

Standard Plastic Keychain

The standard keychain is plastic which provides good durability and an easy quick disconnect for convenient access.

If you ever need a replacement or extra keychain one can be purchased from the OnlyKey store.

Heavy Duty Metal Keychain

This keychain provides better performance and durability than the standard plastic keychain. This keychain swivels 360° and is designed to withstand the stresses of demanding use. This can be purchased from the OnlyKey store. {% include image.html file="51vOBo8vUSL.SL1000.jpg" max-width="248" %}

Troubleshooting {#troubleshooting}

Common Issues {#common-issues}

Below is a list of common issues and solutions.

Issue Solution
Accidentally press OnlyKey button All OnlyKeys now include a silicone case accessory, this is also available for purchase on Amazon. Using the case makes it difficult to inadvertently press a button.
Not working with certain sites / Not entering data in correct field We often get customers that ask how to set up a specific site with OnlyKey. There are several examples listed in the table provided in the Set up a slot section. If you have a use case that is not covered by this please open a new issue on the support forum.
Missing characters while typing / typing too fast / typing too slow Adjust the type speed in preferences.
Google Authenticator types NOTSET instead of OTP code This occurs when the OnlyKey does not have the time set. Time is set from the OnlyKey app which occurs automatically. The OnlyKey app must be installed for the code to be generated.
Entering data into OnlyKey App and selecting submit but the data is not saved The check box next to the data must be selected.
Yubico® OTP Error (LastPass) The majority of Yubikey® OTP applications require Yubicloud setup including LastPass. See Yubicloud section of User's Guide.

If you have an issue not listed here please reference the online support forum here.

Change your PIN {#pin-change}

If you need to change your self-destruct PIN that can be completed in the setup tab of the OnlyKey app at any time. If you need to change your primary or second profile PIN you must do a backup and restore. The process is as follows:

  • Backup OnlyKey
  • Wipe OnlyKey (self destruct PIN or enter incorrect PIN 10x)
  • Complete setup again and choose a different PIN
  • Load backup passphrase/key
  • Restore backup file

{% include note.html content="The reason that primary PIN can't just be changed is a security reason. The key that encrypts all of sensitive data on the OnlyKey is derived from your PIN and a random number." %}

Web Links {#web-links}

Documentation - https://docs.crp.to

FAQs - https://docs.crp.to/faq.html

Forum - https://groups.google.com/forum/#!forum/onlykey

Store – https://crp.to/ok

Github – https://github.com/trustcrypto

Getting started with OnlyKey – https://crp.to/okstart

{% include links.html %}