#27,915 in Electronics
Use arrows to jump to the previous/next product
Reddit mentions of HyperFIDO Mini - U2F Security Key
Sentiment score: 1
Reddit mentions: 2
We found 2 Reddit mentions of HyperFIDO Mini - U2F Security Key. Here are the top ones.
Buying options
View on Amazon.comor
SECURE ONLINE ACCOUNTS - Protect your online accounts with a strong two-factor authentication, U2F. Never lose access to sensitive online accounts such as bank accounts, email accounts, and private documents through password theft, phishing, hacking or keylogging scams. This security key combats real-time attacks such as man-in-the-middle (MITM). UNIVERSAL COMPATIBILITY - The HyperFIDO U2F security key device works with the latest Google Chrome or any other FIDO-compliant application on Windows, Mac OS or Linux. FIDO U2F CERTIFIED - Certified by Fast IDentity Online FIDO Alliance. Supports U2F protocol (No UAF or OTP). COMPACT DESIGN - Designed with a compact form factor attaches easily to a keychain without bulk. Because of it’s low-cost and simple design the HyperFIDO is also perfect as a second backup U2F security key. USER FRIENDLY - Authentication with the press of a button. Simple and twice as secure because only the physical act of pressing the button on the HyperFIDO security key can grant access. Use a single trusted device to sign in to multiple accounts, enables keychain devices. No PIN or password to memorize, simply plug and play!
Specs:
> Google Titan
They suck:
For $50-$70, I'd probably get one of these options as a backup:
I also tried GoTrustID (paid) and Krypton which are app based U2F authenticators with push notifications for verification. They act as a decent wireless software backup that works for all accounts. GoTrustID is BLE based while Krypton uses push notifications.
Google currently doesn't allow using an Android phone as a BLE security key except for Google accounts (uses a proprietary protocol called CaBLE that only works on Chrome Desktop right now).
I've personally found USB-C to be the most robust method on Android phones and newer laptops, it's really quick and easy. Windows 10 doesn't even show me an option to pair a Bluetooth U2F authenticator on 1903, only Chromium browser has implemented it, not the OS itself. With the YubiKey 5Ci, it should be easy to authenticate on literally any device from the last 10 years with minimal dongles, so it will be my first choice as a backup. USB-C is better than NFC for me.
>I find it quite ridiculous that such high securities measures are taken for some student account that does not contain anything of significant monetary value.
>complain how stupid it is that my student account has higher security measures than my bank account, while it doesn't even remember the computer I'm using like my bank account does.
The thing you should take away from this is that all of your accounts should be at least this well protected. You should be screaming at your bank for not providing multi-factor authentication, not the other way around.
That said, you should always have multiple multi-factor authentication methods available to you.
Myself, I have the Duo code generating fob, I have two U2F hardware keys, one in my desktop and one in my laptop, I have the Duo app on my phone, and I have my fiancee's phone number as a backup.
That's possibly (probably?) overkill, but it keeps me secure in knowing I'm not going to get locked out of my account.
That said, there's plenty in your myUCLA account which warrants that level of protection.
If I had access to your account I could add you to classes, drop you from classes, or change your grading to pass/no pass.
I could access your BruinBill where I can change your BruinDirect enrollment and direct your financial aid refund somewhere else.
I could cancel your housing or parking application.
I could access medical records if you use Ashe or CAPS.
I could waive your health insurance, leaving you uninsured.
I also gain access to your school email account, which if you happen to use as your email address for other services gives me access to all of them as well.
There is so much behind that one simple login, to not have it require multi-factor authentication would be the crazy thing.
If you're truly worried about it pick yourself up one of these: U2F security key
It's $10. You can either leave it in your laptop or, better, put it someplace safe so you can get into your account in an emergency.
Best of luck though. It's really unfortunate and challenging when you can't access one of the authentication methods in your MFA setup, particularly if it's your only one.
Hopefully you'll take some of this to heart, see the merits of MFA and enable it wherever you can.
Bonus pro-tip: invest in a decent Password Manager and use a different random password of at least 16 alphanumeric+symbol characters everywhere.
Most of the time your chances of being compromised online are very low, but all it takes is one bad actor getting a toehold into your digital life to completely ruin your year.