FIDO U2F Security Key - the original and trusted security key from Yubico, co-creator of the FIDO U2F standard
Frequently bought together
Customers who bought this item also bought
Customers who viewed this item also viewed
Have a question?
Find answers in product info, Q&As, reviews
Two-factor authentication made easy!
Yubico's FIDO U2F Security Key is a USB device you use in combination with your username/password to prove your identity. With a simple touch, the FIDO U2F Security Key protects access to your Google, DropBox, and Dashlane accounts. Keep one on your keychain with your house keys, and a second backup key in a safe place at home in case you ever lose/misplace your house keys.
Easy-to-use FIDO U2F Security Key performs the FIDO Universal 2nd Factor security protocol.
Easier and safer than authenticator apps: No more reaching for your smartphone to re-type passcodes you receive via SMS or from an authenticator app. Just plug in your FIDO U2F Security Key and tap to securely log in quicker than with SMS or authenticator apps.
Works out of the box to with popular consumer applications: Protect your Facebook, GMail, DropBox, and Dashlane accounts.
Using your FIDO U2F Security Key: Go to yubico.com/start for instructions on how to register your FIDO U2F Security Key with applicable services. Steps to enroll your FIDO U2F Security Key may differ from service to service. Yubico has provided steps based on their own testing, and links to those services for full instructions.
USB Type A compatible: Plugs into USB Type A ports. Purchase adapters for devices that feature USB-C ports.
Extremely durable (IP67 class rating by IEC 60529): High quality, crush-resistant, and water-resistant.
Attaches to house and car keychains.
What do customers buy after viewing this item?
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Strong passwords are the first step, as well as keeping different passwords for different accounts, however if you wish to take your internet security to the next level, you should consider 2-factor authentication.
You may have used 2-factor authentication in other forms: receiving a one-time passcode to your mobile phone perhaps, or maybe using a digital secure key/code generator when logging in to your banking -- this is the same thing, in another form: as well as signing in with your standard username and password, you also enter this in the USB drive to confirm your identity.
Get this and even if your username & password fall in to the wrong hands, your account won't
I use it for my google account (which I use for everything, including email). It works perfectly but so far I have found that it is only compatible when used in the Chrome browser. There are fallbacks you can use (e.g. single use code to mobile) if using other browsers or non-USB devices.
*** Supported by: Gmail, YouTube, Github, Bitbucket, Dropbox and more!
If you only need U2F authentication then this blue U2F one is all you need, no complexity there (compared to the YubiKey4, however for extra using 2FA hardware devices on other features such as windows login and more, YubiKey 4 is useful, but I think it is overpriced, hence this U2F is a better buy).
However, you will need to store it in a safe place or keep it on you at all times otherwise, it is physically not as safe as a mobile phone with TOTP authenticators (FreeOTP for example) as they are locked by PIN's/Patterns or otherwise.
However, keep in mind U2F still relies on a password (and perhaps question challenge) precursor on the service you use so you have that weak link and to remember that (you can generate those using KeePass2 or something, which is a great app).
UAF is if you really want to be really password-less by using a signature of you're biometrics (usually fingerprint).
Keep in mind, only Chrome supports it and Firefox (currently via an add-on until Q4 2017, release 57, according to their roadmap) and Microsoft has not got it planned (according to their roadmap, however Windows 10 will support it if it does not already, not sure about them back porting that to Windows 7 though ).
You will need to (as a customer to their customer support) get your services to support FIDO U2F/UAF, and I strongly recommend you do so, especially critical services such as finance or anything you pay for / rely on heavily for privacy.
1) Keep it on a lanyard, a good one and keep it in a safe place (physical access security and something you have) as if they still get your password and question challenge, all they have to do is push a button and they're in (if they have physical access to your key).
These lanyards are cool ( Original Lanyards Leis Label with Key Ring multi-coloured black / yellow )
2) Side-channel attacks, there has been some research and testing on their older keys, hopefully power analysis and differential fault injection is mitigated from that feedback
You can find a PDF of the paper online along with Yubico's response (circa 2014)
3) USB electrical contacts are exposed, would be better if it came with a cover, but you can improvise here if you want that.
4) No OLED screen to CONFIRM the website you are authenticating on, this prevents compromised (perhaps public) machine usage.
Ideally you want to confirm the website on the 2FA device screen before you authenticate with the device button. Currently you have to trust the machine you are using it on.
Think of this as a better mobile TOTP 2FA (but with the same risks of physical access)
I would recommend upgrading to UAF once services start supporting it (but keep I mind, biometrics usage - usually fingerprint).
Also in this era of quantum computation, usually the encryption algorithms we use today are NOT quantum safe (ECC, DH and RSA are not quantum safe - read up on Shors and Groves algorithms). Lattice, code-based and Multivariate polynomial methods are more quantum safe (for now).
Much better than no 2FA, improvement over Mobile TOTP 2FA (which is the VERY VERY least you want now days).
I wish Amazon support FIDO U2F/UAF (I recommend using FreeOTP for TOTP they currently only support, it is open source and free on mobile) and many other services (this is where you come in, everybody contact support and ask your services to support more 2FA).
You can't go wrong, stick the stick in a usb port and go through the simple steps to at a security key to your account via the 2-step method and you are good to go.
I have tested it out on a few machines that we foreign to me and the key works flawlessly. I may pass this key on to a member of my family at some point and pony up for the Neo as it has greater functionality and NFC.
I had a go at setting up Windows Hello within Windows 10 Anniversary build so I could login to my Laptop and PC using this key but after downloading the Yubikey app from the Windows Store I realised that this key is not supported for this purpose. No big deal as I didn't purchase it for this.
Both of these links are handy in case you want to compare the different protocols and supported features of the Yubico keys.
From the start I hadn't really thought the item was all that marvellous - it was a bit hit and miss when you pressed the gold button after inserting it into your computer's USB port. However it would always work after a few attempts. Annoying, but at least it worked. However, I cannot get it to work for anything now. It has been on a key ring with various keys (eg: house keys) but that shouldn't really cause it to stop working - it is intended to be stored in that way.
I went for this item as it was cheaper than other options. I don't really think that the more expensive items are justified in terms of price.
It is really difficult - and probably impossible to set your security up in such a way as to be completely foolproof. The problem is you cannot rely on hardware (this item is a case in point) so you always need "backup" which is always something of a weak link.
Would you like to see more reviews about this item?
Most recent customer reviews