#27,915 in Electronics
Use arrows to jump to the previous/next product

Reddit mentions of HyperFIDO Mini - U2F Security Key

Sentiment score: 1
Reddit mentions: 2

We found 2 Reddit mentions of HyperFIDO Mini - U2F Security Key. Here are the top ones.

HyperFIDO Mini - U2F Security Key
Buying options
View on Amazon.com
or
SECURE ONLINE ACCOUNTS - Protect your online accounts with a strong two-factor authentication, U2F. Never lose access to sensitive online accounts such as bank accounts, email accounts, and private documents through password theft, phishing, hacking or keylogging scams. This security key combats real-time attacks such as man-in-the-middle (MITM). UNIVERSAL COMPATIBILITY - The HyperFIDO U2F security key device works with the latest Google Chrome or any other FIDO-compliant application on Windows, Mac OS or Linux. FIDO U2F CERTIFIED - Certified by Fast IDentity Online FIDO Alliance. Supports U2F protocol (No UAF or OTP). COMPACT DESIGN - Designed with a compact form factor attaches easily to a keychain without bulk. Because of it’s low-cost and simple design the HyperFIDO is also perfect as a second backup U2F security key. USER FRIENDLY - Authentication with the press of a button. Simple and twice as secure because only the physical act of pressing the button on the HyperFIDO security key can grant access. Use a single trusted device to sign in to multiple accounts, enables keychain devices. No PIN or password to memorize, simply plug and play!
Specs:

idea-bulb Interested in what Redditors like? Check out our Shuffle feature

Shuffle: random products popular on Reddit

Found 2 comments on HyperFIDO Mini - U2F Security Key:

u/prajaybasu · 16 pointsr/yubikey

> Google Titan

They suck:


  • The Titan hardware is the same as Feitian MultiPass K13 and Feitian ePass NFC bundle

  • The rebranded MultiPass that they're selling sucks, it uses Micro USB which is a weak and outdated connector.

  • The keys are made in China by a Chinese company. If you care about this, then you're better off with Yubico or some open source vendor. I don't have a problem with Feitian though, they've been in this business for a long time.

  • The MultiPass key isn't waterproof and can be popped open. The non BLE versions are sealed using epoxy and really impossible to break, just like a YubiKey. I wouldn't trust a MultiPass key as a backup. See the Amazon reviews for yourself.

  • There's lots of issues with BLE, OSes even had to block pairing with insecure security keys that Google/Feitian was forced to recall.

  • It's another damn device that requires charging.

  • Can only be used for Google Accounts on iOS with the Smart Lock app installed. While YubiKey has made active efforts to support the 5Ci on iOS.

    For $50-$70, I'd probably get one of these options as a backup:

  • 50-70$ -1 x YubiKey 5 series, preferably the 5Ci or another 5 NFC.
  • 60$ - 5 x Feitian HyperFIDO Mini, to hide them in bank lockers/backpacks
  • 60$ - 3 x Yubico Security Key, because they support FIDO2 for Azure AD/Microsoft Acccounts
  • 60$ - 1 x Feitian BioPass, since biometrics is more secure than typing a PIN on a software keypad. Wouldn't trust it in an airport though, legally a grey area.


    I also tried GoTrustID (paid) and Krypton which are app based U2F authenticators with push notifications for verification. They act as a decent wireless software backup that works for all accounts. GoTrustID is BLE based while Krypton uses push notifications.

    Google currently doesn't allow using an Android phone as a BLE security key except for Google accounts (uses a proprietary protocol called CaBLE that only works on Chrome Desktop right now).

    I've personally found USB-C to be the most robust method on Android phones and newer laptops, it's really quick and easy. Windows 10 doesn't even show me an option to pair a Bluetooth U2F authenticator on 1903, only Chromium browser has implemented it, not the OS itself. With the YubiKey 5Ci, it should be easy to authenticate on literally any device from the last 10 years with minimal dongles, so it will be my first choice as a backup. USB-C is better than NFC for me.
u/CapaneusPrime · 3 pointsr/ucla

>I find it quite ridiculous that such high securities measures are taken for some student account that does not contain anything of significant monetary value.

>complain how stupid it is that my student account has higher security measures than my bank account, while it doesn't even remember the computer I'm using like my bank account does.

The thing you should take away from this is that all of your accounts should be at least this well protected. You should be screaming at your bank for not providing multi-factor authentication, not the other way around.

That said, you should always have multiple multi-factor authentication methods available to you.

Myself, I have the Duo code generating fob, I have two U2F hardware keys, one in my desktop and one in my laptop, I have the Duo app on my phone, and I have my fiancee's phone number as a backup.

That's possibly (probably?) overkill, but it keeps me secure in knowing I'm not going to get locked out of my account.

That said, there's plenty in your myUCLA account which warrants that level of protection.

If I had access to your account I could add you to classes, drop you from classes, or change your grading to pass/no pass.

I could access your BruinBill where I can change your BruinDirect enrollment and direct your financial aid refund somewhere else.

I could cancel your housing or parking application.

I could access medical records if you use Ashe or CAPS.

I could waive your health insurance, leaving you uninsured.

I also gain access to your school email account, which if you happen to use as your email address for other services gives me access to all of them as well.

There is so much behind that one simple login, to not have it require multi-factor authentication would be the crazy thing.

If you're truly worried about it pick yourself up one of these: U2F security key

It's $10. You can either leave it in your laptop or, better, put it someplace safe so you can get into your account in an emergency.

Best of luck though. It's really unfortunate and challenging when you can't access one of the authentication methods in your MFA setup, particularly if it's your only one.

Hopefully you'll take some of this to heart, see the merits of MFA and enable it wherever you can.

Bonus pro-tip: invest in a decent Password Manager and use a different random password of at least 16 alphanumeric+symbol characters everywhere.

Most of the time your chances of being compromised online are very low, but all it takes is one bad actor getting a toehold into your digital life to completely ruin your year.