paint-brush
Avoid Leaking Your Identity with YubiKeyby@ssg
13,799 reads
13,799 reads

Avoid Leaking Your Identity with YubiKey

by Sedat Kapanoglu5mJanuary 25th, 2017
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Using a U2F (Universal 2nd Factor) device is currently one of the most secure authentication methods available to end-users. Its advantage comes from the hardware isolation. It’s impossible to steal keys from it or trigger authentication just using <a href="https://hackernoon.com/tagged/software" target="_blank">software</a>. Physical interaction is mandatory. U2F is resistant to phishing by design too. For instance you cannot be tricked to press the key and authenticate with a “fake” web page since authentication origin is also part of the process and the communication between the device and the web browser cannot be intercepted by a third party. A malicious person cannot ask for your “U2F codes” because there are no codes in play.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Avoid Leaking Your Identity with YubiKey
Sedat Kapanoglu HackerNoon profile picture
Sedat Kapanoglu

Sedat Kapanoglu

@ssg

L O A D I N G
. . . comments & more!

About Author

Sedat Kapanoglu HackerNoon profile picture
Sedat Kapanoglu@ssg

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite