Fact-checked by Grok 2 weeks ago

YubiKey

The YubiKey is a series of durable keys manufactured by Yubico to enable phishing-resistant (MFA), passwordless login, and cryptographic operations for protecting access to computers, networks, and online services.
Introduced in 2008, the device supports multiple open standards including FIDO2/ for passwordless authentication, FIDO U2F for second-factor verification, and Yubico's (OTP) protocol, allowing seamless integration with services from providers like , , and .
Yubico, founded in 2007 by Stina Ehrensvärd in with subsequent expansion to the , developed the YubiKey to address vulnerabilities in traditional password-based and SMS-based authentication by embedding tamper-resistant technology in a compact USB, , or .
Certain models achieve certification, meeting stringent requirements for government and enterprise use, while the series has been adopted by major organizations to mitigate account takeover risks without introducing significant user friction.

History

Founding of Yubico and Early Development

Yubico was founded in 2007 in , , by Stina Ehrensvärd and Jakob Ehrensvärd to address vulnerabilities in online , particularly attacks and reliance on weak passwords. The company's initial focus was developing a hardware token for simple, secure one-touch logins without requiring users to remember complex credentials. Stina Ehrensvärd, who served as CEO for 16 years until 2023, drew from personal and professional experiences in security to prioritize usability alongside protection against man-in-the-middle exploits. The inaugural YubiKey device, version 1.0, was designed as a USB-based generator emulating keyboard input for seamless integration with existing systems. Manufacturing began in in 2008, marking the first production of a compact, durable key capable of generating event-based or time-based codes via a proprietary . Early prototypes emphasized tamper resistance and broad compatibility, avoiding software dependencies to minimize attack surfaces. By late 2008, the device supported initial deployments for and users seeking alternatives to SMS-based two-factor . Development progressed rapidly into 2009–2010, with the release of YubiKey 2.0 featuring a molded monoblock design for enhanced durability against physical wear and environmental factors. This iteration incorporated refinements to the (OTP) protocol, allowing customization of secret keys and configuration slots for varied authentication modes. Early adoption was driven by partnerships with tech communities and validation servers, enabling free personalization services to build ecosystem trust. These advancements laid the groundwork for scalable , prioritizing hardware-bound cryptography over revocable software tokens.

Key Product Releases and Milestones

The first YubiKey device was publicly demonstrated at the in April 2008, introducing one-touch authentication via (OTP) emulation for enhanced user login security. A more durable YubiKey II model followed in 2009, featuring improved hardware robustness while maintaining compatibility with Yubico's validation servers for OTP verification. In 2012, Yubico released the YubiKey NEO, adding (NFC) support for contactless on mobile devices, alongside the compact YubiKey Nano form factor designed for semi-permanent USB port installation. The 2014 launch of the FIDO U2F Security Key marked Yubico's entry into public-key cryptography-based second-factor , certified under the standard to resist attacks without relying on shared secrets. The YubiKey 5 Series debuted on September 24, 2018, as the industry's first multi-protocol security keys supporting FIDO2 and for passwordless login, alongside protocols like OTP, U2F, smart card, and OATH-HOTP/TOTP. Variants such as the YubiKey 5Ci, released August 20, 2019, introduced dual and connectors for broader device compatibility, including . Subsequent advancements included the YubiKey 5 FIPS Series on May 3, 2021, achieving Level 2 validation for government and compliance while retaining multi-protocol capabilities. The YubiKey Bio Series launched October 4, 2021, integrating biometric with FIDO2 for simplified passwordless access. In May 2024, version 5.7 rolled out across YubiKey 5 and Key Series, enhancing PIN complexity requirements, , and attestation handling for improved posture. This update became available in devices shipping from late May 2024, with the YubiKey Bio FIDO Edition following in August 2024 to prioritize FIDO-only protocols.

Expansion and Recent Advancements

In 2021, Yubico completed an on , raising approximately SEK 1.15 billion to fund further and market . This capital infusion supported scaling production and global distribution, enabling the company to address rising demand for hardware-based amid increasing threats and regulatory requirements for . Yubico expanded its enterprise delivery model significantly in May 2025, increasing YubiKey availability to 175 countries and 24 territories—more than doubling prior coverage—to facilitate faster deployment of pre-configured devices for remote and office users. This enhancement of the YubiKey subscription targeted organizations adopting passwordless strategies, reducing logistical barriers and accelerating phishing-resistant rollout. Product advancements continued with the July 2025 release of YubiKey 5 series variants featuring enhanced PIN controls, including automatic activation of PIN complexity requirements and a minimum six-character length, designed to comply with stringent regional standards in and elsewhere. Concurrent version 5.7 introduced support for up to 100 resident passkeys (up from 25), FIDO2 Level 2 certification for improved biometric integration verification, and new cryptographic algorithms such as 3072/4096, Ed25519, and X25519 for PIV operations. These updates bolstered compatibility with emerging standards like while maintaining with legacy protocols. Partnerships advanced integration capabilities, exemplified by the October 2025 collaboration with to enable FIDO2-based, phishing-resistant passwordless access to encrypted vaults, prioritizing hardware-bound credentials over software alternatives. Yubico's 2024-2025 initiatives also emphasized growth, with expanded "Works with YubiKey" certifications enhancing across identity providers and endpoint management tools. These developments reflect sustained revenue momentum, with Q2 2025 reports indicating recovering order intake despite macroeconomic pressures.

Technical Design

Hardware Architecture

The YubiKey employs a compact, tamper-resistant monoblock design encapsulated in for physical durability, lacking batteries or to ensure reliability across an operational lifespan exceeding 100,000 touch cycles. Core models, such as those in the YubiKey 5 Series, integrate a single secure as the primary computational and cryptographic element, paired with minimal passive components like capacitors and resistors for power regulation and . This supports multiple authentication protocols through firmware-defined applications stored in isolated slots within the chip, with a dedicated application enforcing access controls via a 16-byte lock code. The central in YubiKey 5 Series devices is an Infineon M7893 B11 (or variants like SLE78 CLUFX3000PH for most models and SLE78 CLUFX5000PH for YubiKey 5Ci), certified to EAL6+ for high-assurance security, featuring non-updatable firmware in and hardware-enforced isolation between cryptographic operations. This chip handles key generation, storage, and operations for protocols including , , and OTP, with up to 144 KB of for credential data across five application slots. It exposes a composite USB operating at full speed (12 Mbps), emulating HID , CCID reader, and FIDO authenticator classes, while NFC-enabled variants incorporate an ISO 14443-compliant for contactless operation. User interaction relies on a capacitive touch sensor connected via GPIO pins to the microcontroller, triggering authentication upon contact with the device's gold-plated sense plate, often accompanied by an LED indicator for status feedback. Power is drawn directly from the host USB port (<50 mA consumption) or NFC field, enabling operation without external sources. Form factors vary—such as USB-A, USB-C, Nano, or Lightning connectors—but share this uniform core chipset for consistent behavior, with dimensions typically around 18–45 mm in length and 3–5 mm thickness. Earlier YubiKey generations, like the YubiKey 4 Series, utilized similar secure element principles but with distinct chipsets validated under FIPS 140-2 Level 2.

Supported Protocols and Interfaces

The YubiKey hardware security keys, particularly the YubiKey 5 Series, incorporate multiple applications that enable support for diverse protocols, allowing compatibility with a wide range of services and systems. These protocols leverage the device's to perform cryptographic operations without exposing private keys. Key supported protocols include 2, which facilitates passwordless login and (MFA) using and client-to-authenticator protocols (CTAP), with capacity for up to 25 resident credentials; U2F, an earlier standard for second-factor across web services via universal second factor (U2F) challenges; and , a W3C standard integrated with FIDO2 for browser-based supporting both hardware keys and platform authenticators. Additional protocols encompass for time-based (TOTP) and counter-based (HOTP) s, storing up to 64 credentials; OpenPGP for smart card operations including signing, , and with RSA or ECC keys; Yubico OTP and static password modes for generation via HID interface; and (Personal Identity Verification), compliant with NIST SP 800-73, enabling smart card middleware for certificate-based , digital signatures, and across designated slots. The device also supports HMAC-SHA1 challenge-response for systems. These protocols operate independently or in combination, with firmware segmentation ensuring isolation between applications to mitigate cross-protocol risks.
ProtocolPrimary FunctionKey Standards/Features
Passwordless MFA, resident keysCTAP2, up to 25 keys, PIN/biometric support
FIDO U2FSecond-factor authPublic-key crypto, no drivers needed
Dynamic OTPsTOTP/HOTP, up to 64 slots via CCID
/Smart CardCertificate authNIST SP 800-73, RSA/ECC operations
OpenPGPSigning/ECC/RSA, smart card compatible
OTPOne-time passwordsYubico mode, challenge-response
For physical connectivity, YubiKeys utilize USB 2.0 as a composite device exposing interfaces such as HID for OTP/ and CCID for smart card protocols like and OpenPGP, compatible with Windows, macOS, (via ), and . Form factors include , , or dual connectors, with support adhering to ISO/IEC 14443-A/M standards for contactless operations on compatible models, enabling touch-based within 20 seconds on devices like and later. Select variants, such as the YubiKey 5Ci, incorporate Apple for iOS integration, mirroring functionality for OTP and . These interfaces ensure broad platform interoperability without requiring batteries or specialized drivers in most cases.

Features and Operations

Authentication Mechanisms

YubiKeys facilitate authentication through hardware-bound cryptographic operations that prevent credential extraction, leveraging protocols such as , , one-time passwords (OTP), (HOTP/TOTP), (PIV), and OpenPGP. In and , the device generates a public-private key pair during registration, retaining the private key securely within its tamper-resistant chip; during authentication, it signs a server-issued challenge using the private key upon user touch, enabling phishing-resistant verification without transmitting secrets over the network. operates similarly but as a second-factor , confirming user presence via a touch-activated signature on a challenge, integrated into browsers like and services such as accounts since its standardization in 2014. For OTP mechanisms, YubiKeys emulate keyboard input to deliver Yubico OTP—a proprietary 44-character code comprising a public ID, ID, and AES-encrypted dynamic payload—or OATH-compliant HOTP (counter-based ) and TOTP (time-based ), where the device computes codes from a seed without exposing it. authentication via the PIV application stores X.509 certificates and keys, allowing certificate-based (e.g., for VPNs or SSH) through challenge-response operations compliant with NIST SP 800-73 standards, with keys protected against . The OpenPGP application supports key pair generation for signing, encryption, and , enabling GnuPG-compatible workflows where keys remain non-exportable and operations require physical touch for user verification. These mechanisms operate independently across applications on the YubiKey 5 Series and later models, with up to five protocols configurable per slot via USB, , or interfaces, ensuring compatibility with legacy systems while prioritizing passwordless flows in modern deployments. Authentication success relies on origin binding in protocols to thwart man-in-the-middle attacks, and monotonic counters or timestamps in OTP/ to prevent replay, with all operations executed in a certified to Level 2 or higher in validated variants.

Customization and Management Tools

YubiKey customization primarily involves configuring its multiple slots and applications, such as OTP (), FIDO2, (Personal Identity Verification), and OpenPGP, using dedicated software tools provided by Yubico. The primary tool for this is YubiKey Manager, a cross-platform application available in both graphical (yubikey-manager-qt) and (ykman) variants, supporting Windows, macOS, and . It enables users to identify YubiKey models, versions, and serial numbers; configure FIDO2 PINs and credentials; manage certificates and keys; set up OTP slots for Yubico OTP, static passwords, or challenge-response modes; and reset specific applications if needed. The ykman CLI offers advanced capabilities for scripting and automation, including detailed slot programming—such as loading keys for OTP generation, enabling touch-triggered responses, or appending user-defined prefixes/suffixes—and firmware version checks without altering the device. For FIDO2 customization, users can set PINs, manage resident keys, and configure credentials via the tool, ensuring compatibility with protocols. PIV management includes generating key pairs, importing certificates, and slotting asymmetric keys for smart card-like operations, adhering to NIST SP 800-73 standards. An older tool, the YubiKey Personalization Tool (including its GUI and library variants), was historically used for batch programming OTP credentials, checking , and basic slot reconfiguration, particularly for static passwords or HMAC-SHA1 challenge-response. However, Yubico announced its end-of-life effective February 19, 2026, recommending migration to YubiKey Manager for all configuration needs due to the latter's broader protocol support and ongoing maintenance. YubiKey Manager supersedes it by integrating OTP, , and functionalities into a unified , reducing the need for multiple tools. For enterprise-scale management, Yubico offers integrations like YubiEnterprise Delivery for bulk provisioning and encoding, which automates customization workflows such as pre-loading credentials or enforcing policies via APIs, though core device-level tools remain YubiKey Manager. These tools do not support user-initiated firmware updates, as YubiKey firmware is factory-set and non-upgradable on most models to maintain security integrity. All configurations require physical access to the device, preventing remote tampering.

Proprietary Encoding: ModHex

ModHex is a base-16 encoding scheme developed by Yubico for use in YubiKey's (OTP) output, designed to mitigate ambiguities arising from diverse keyboard layouts. Unlike standard , which employs digits 0-9 and letters A-F, ModHex substitutes a restricted alphabet of 16 characters—c b d e f g h i j k m n r t u v—each representing a unique 4-bit value to ensure consistent interpretation across input methods. This mapping corresponds directly to hexadecimal values as follows: 0→c, 1→b, 2→d, 3→e, 4→f, 5→g, 6→h, 7→i, 8→j, 9→k, A→m, B→n, C→r, D→t, E→u, F→v. The selected characters avoid visually similar glyphs (e.g., excluding 0, O, 1, I, l) and prioritize positions that yield reliable keycodes on QWERTY-derived layouts, thereby enabling keyboard-layout-independent data transmission during OTP entry. In YubiKey OTP generation, ModHex encodes into human-readable strings for seamless integration with text-based systems. A standard YubiKey OTP comprises 44 ModHex characters: the initial 12 characters encode a 6-byte public identifier (fixed per device configuration), while the subsequent 32 characters represent a 16-byte AES-128-encrypted incorporating unique elements such as a private ID, session counters, timestamps, and random data to prevent replay attacks. This encoding packs 4 bits per character, yielding the compact 44-character format from 22 bytes of binary input (6 bytes public ID + 16 bytes encrypted). Yubico introduced ModHex specifically for OTP to address early challenges with international variations, where standard characters could map to unintended inputs; for instance, non-QWERTY layouts might confuse l with 1 or alter positional outputs. The proprietary nature of ModHex stems from Yubico's tailored design choices, including the custom alphabet and validation rules integrated into their validation servers (e.g., YubiCloud), which decode ModHex exclusively for OTP verification. Tools like Yubico's modhex utility facilitate conversion between ModHex strings and / equivalents for and , as in modhex -e test to encode ASCII "test" into ModHex. While effective for OTP's low-bandwidth, touch-triggered use case, ModHex's layout-specific optimizations assume primary compatibility, prompting Yubico recommendations to temporarily switch to layouts for OTP entry in divergent configurations. This encoding remains central to YubiKey's legacy OTP mode, distinguishing it from protocol-agnostic alternatives like FIDO2.

Security Assessment

Core Security Principles

The YubiKey employs hardware-based where private keys are generated within the device's and never exported or transmitted outside the hardware. This isolation prevents extraction of secrets even if the host system is compromised, as all signing operations occur on-device using tamper-resistant components. High-entropy further ensures resistant to attacks. Phishing resistance forms a , particularly through protocols like U2F and FIDO2, which bind credentials to specific origins via challenge-response mechanisms that verify the authentic domain before releasing assertions. This design thwarts man-in-the-middle and credential by rejecting signatures for mismatched origins, reducing successful phishing risk by 99.9% according to empirical studies. Protocols such as SCP11 and CTAP2.2 incorporate and encrypted channels (e.g., AES-GCM, ECDH) without relying on pre-shared secrets, minimizing exposure to network-based attacks. Physical and access protections include validation at Level 3 for tamper-evidence, enabling detection of unauthorized access attempts. Brute-force resistance is enforced via limited PIN attempts (e.g., three failures trigger lockout) and mandatory minimum PIN lengths of six characters in compliant modes. The absence of batteries, moving parts, and wireless dependencies (beyond optional ) reduces attack surfaces from or environmental vectors, while IP68-rated durability supports operation in harsh conditions without compromising integrity.

Documented Vulnerabilities and Exploits

In September 2024, researchers disclosed a side-channel (CVE-2024-45678) in the Infineon cryptographic library used by YubiKey 5 Series devices with versions prior to 5.7.0, enabling extraction of ECDSA keys through timing discrepancies during operations. The , dubbed EUCLEAK by its discoverers at NinjaLab, requires physical possession of the device and thousands of measurements to recover keys, primarily affecting FIDO2 attestation and credential keys due to their default use of vulnerable ECDSA operations. No remote is possible, and the flaw stems from implementation details in the underlying rather than YubiKey design. In April 2025, Yubico reported CVE-2025-29991 affecting YubiKey firmware from 5.4.1 to 5.7.3 (prior to 5.7.4), involving a flawed implementation of the CTAP PIN/UV Auth Protocol Two that generates predictable nonces, facilitating offline brute-force attacks on user PINs. This issue allows an attacker with physical access to attempt PIN recovery more efficiently than intended, though success depends on PIN complexity and the device's retry limits. The vulnerability does not compromise keys directly but undermines the protocol's resistance to exhaustive search. Earlier vulnerabilities include a 2015 PIN validation logic flaw in YubiKey NEO's OpenPGP applet (YSA-2015-1), which permitted incorrect PIN handling under specific retry conditions, potentially enabling unauthorized access after exhaustion of attempts. Such issues have been limited in scope, with no public demonstrations of widespread exploits compromising deployed YubiKeys without physical tampering. Independent analyses, such as attempts to reverse-engineer devices, have not yielded scalable breaks beyond protocol-specific weaknesses.
CVE IDAffected FirmwareDescriptionRequirementsImpact
CVE-2024-45678< 5.7.0 (YubiKey 5 Series)ECDSA key extraction via timing side-channelPhysical access, repeated measurementsKey recovery, cloning possible
CVE-2025-299915.4.1–5.7.3Predictable nonces in PIN/UV auth protocolPhysical access, offline computationAccelerated PIN brute-force
YSA-2015-1 variantsOpenPGP PIN validation bypassSpecific retry sequencesPotential unauthorized access

Responses, Mitigations, and Ongoing Improvements

Yubico maintains a structured process for addressing security issues in YubiKey devices, issuing detailed advisories that include descriptions, affected versions, severity ratings, and recommended mitigations. For instance, in response to a side-channel (CVE-2024-45678) discovered in Infineon's cryptographic , affecting YubiKey 5 Series and Security Key Series devices with prior to 5.7.0, Yubico rated the issue as moderate severity due to the need for physical access and extensive computational resources (up to 2^30 operations for a 4-digit PIN). To mitigate this unpatchable hardware flaw in the , Yubico released version 5.7.0 on May 21, 2024, incorporating an updated library from Infineon that prevents key recovery under similar conditions. For legacy devices unable to receive the update, operational mitigations include enforcing PINs of at least 5 digits to raise the attack complexity by orders of magnitude (e.g., 100,000 combinations for 5 digits versus 10,000 for 4), alongside reliance on and user presence verification protocols. Subsequent advisories demonstrate proactive patching; YSA-2025-02, issued April 2, 2025, addressed a low-severity flaw in the CTAP PIN/UV Auth Protocol implementation for firmware versions 5.4.1 through 5.7.3, with fixes deployed in later releases to prevent partial bypasses. Yubico's —spanning minor to critical—guides users on risk prioritization, emphasizing empirical factors like exploit feasibility over theoretical impacts. Ongoing improvements focus on enhancements that bolster resilience, such as the 5.7 series' support for CTAP 2.1, enterprise attestation, expanded storage, and larger / key sizes (up to 4096-bit and Ed25519), reducing exposure to known cryptographic weaknesses. Later variants, including YubiKey 5 Enhanced PIN models announced July 15, 2025, enforce minimum 6-character PINs with automatic complexity checks and mandatory user validation, addressing patterns of weak credential use observed in prior incidents. Yubico collaborates with hardware vendors like Infineon for library updates and advocates layered defenses, including immutability to prevent tampering, though this limits retroactive fixes for embedded secure elements.

Adoption and Influence

Enterprise and Consumer Applications

YubiKeys are widely adopted in enterprise environments for implementing phishing-resistant (MFA), particularly in scenarios involving hybrid and remote workers, privileged user access, mobile-restricted devices, shared workstations, and securing customer-facing applications. These deployments leverage YubiKey's support for protocols such as FIDO2 and to enable and integration with enterprise systems like , which secures access to cloud services, VPNs, and sensitive data for organizations including federal agencies and small businesses. Yubico reports that its solutions protect over 4,000 businesses and more than 10 million users across nearly 160 countries, with integrations facilitating scalable rollout for high-assurance use cases like enterprise attestation to verify device in regulated sectors. Notable enterprise implementations include Google's large-scale deployment of YubiKeys for employee , demonstrating efficacy in preventing attacks at organizational scale. issued YubiKeys to all employees enterprise-wide to safeguard access to data, applications, and services, emphasizing hardware-bound credentials over software alternatives vulnerable to interception. Similarly, Hotels utilized YubiKeys to transition to passwordless MFA within its environment, reducing reliance on passwords while maintaining compatibility with legacy systems. Services like YubiKey as a Service further support enterprises by providing managed provisioning and revocation for protecting identities in dynamic workforces. For consumers, YubiKeys enable strong authentication for personal accounts on major platforms, including Google Accounts, Microsoft services (such as and ), Facebook, and , where users register the device for FIDO-based 2FA or passwordless login to mitigate risks like . These applications allow individuals to upgrade security for , social media, and without software tokens, using form factors like USB-A, NFC-enabled variants for mobile, or models for portability. Consumer use cases often focus on phishing resistance for high-value accounts, with YubiKeys supporting passkeys for seamless sign-ins across apps and devices, though adoption remains niche compared to app-based authenticators due to the need for physical possession.

Contributions to Industry Standards

Yubico co-developed the Universal Second Factor (U2F) protocol with , initiating the project in 2013 to provide phishing-resistant second-factor authentication using hardware tokens. The U2F specifications were subsequently contributed to the as an , with Yubico joining the organization as a board member on May 7, 2013, to participate in the dedicated U2F . This effort marked one of the earliest industry pushes toward standardized for browser-based authentication, influencing subsequent protocols by prioritizing hardware-bound challenges over software-based alternatives. Extending U2F, Yubico acted as a principal inventor and core contributor to FIDO2, ratified by the in 2019, which expanded capabilities to include passwordless login via client-to-authenticator protocols (CTAP). Parallel to this, Yubico provided technical input to the standard, developed under the W3C and finalized on March 4, 2019, enabling seamless integration of FIDO2 credentials into web applications without proprietary extensions. These contributions emphasized cross-platform compatibility and resistance to man-in-the-middle attacks, as verified through Yubico's production of the first FIDO-certified U2F devices in 2015. Through sustained board-level involvement in the , Yubico has advocated for mandatory attestation in hardware authenticators to ensure supply-chain integrity, influencing certification levels (e.g., FIDO2 Level 1 for basic compliance versus higher tiers for advanced features). This role extends to promoting adoption within extensions, with Yubico's proposals integrated to support hybrid credential types balancing usability and security. Empirical deployment data from early U2F pilots at , involving thousands of employees, informed these standards' design for scalability and minimal friction. The market for phishing-resistant hardware authentication solutions, exemplified by YubiKeys, has expanded in response to escalating cyber threats and mandates for robust . Yubico, the developer of YubiKeys, achieved net sales of 2,326.2 million in , reflecting a 27.3% year-over-year increase driven by demand for passwordless and MFA deployments. This momentum persisted into 2025, with first-quarter sales climbing 24.9% to 623.1 million, though second-quarter figures dipped 18.8% to 499.1 million amid broader economic pressures. Yubico's listing in further accelerated global scaling, with YubiKey distribution extended to 175 countries and 24 territories by May 2025 to support faster delivery of pre-configured devices. Adoption trends reveal growing reliance on such , with approximately 298 tracked organizations utilizing Yubico solutions as of 2025, alongside surveys showing heightened confidence in hardware keys for resistance. In Yubico's 2025 Global State of Authentication survey of 18,000 employed adults across nine countries, respondents' trust in keys and passkeys as the most secure option rose from 17% in 2024 to 37%, with similar upticks in the . These shifts correlate with regulatory pushes and high-profile breaches underscoring legacy MFA vulnerabilities, positioning YubiKeys within a broader ecosystem projected to grow at double-digit CAGRs through 2030. Empirical assessments quantify YubiKeys' impact on . A Forrester Total Economic Impact study, based on interviews with four Yubico customers, calculated a 99.9% reduction in exposure following deployment, yielding a three-year of $3.2 million and 203% ROI through averted incident costs and productivity gains. Independent analyses affirm this, reporting post-adoption slashes in and credential theft risks by 99.9%, as hardware-bound credentials resist social engineering attacks inherent to software-based alternatives. Such data-driven outcomes highlight the devices' role in causal risk reduction, though realization depends on comprehensive beyond isolated use.

Criticisms and Debates

Closed-Source and Transparency Concerns

YubiKey devices incorporate firmware and secure element implementations developed by Yubico, which are not publicly available for independent or modification. This closed-source approach extends to core cryptographic operations, distinguishing YubiKey from fully open-source alternatives like Nitrokey, where is accessible for community scrutiny. In May 2016, Yubico transitioned the YubiKey 4's OpenPGP applet from open-source to a version, citing the need for enhanced features incompatible with . This decision prompted criticisms from researchers and open-source advocates, who argued it undermined trust by preventing verification of implementation integrity and potential undisclosed flaws or backdoors. For instance, raises risks of subtle errors or vendor-specific weaknesses that evade external detection, as audits cannot encompass unexamined paths. Transparency concerns persist due to limited third-party access to internals, fostering reliance on Yubico's self-reported advisories rather than reproducible peer validation. While Yubico publishes vulnerability disclosures—such as the 2024 side-channel flaw in pre-5.7.0 stemming from an Infineon dependency—the opaque nature of the hampers comprehensive external analysis of mitigations or root causes. Critics in -focused communities highlight potential for unverified features like remote attestation or tracking, though no evidence of such implementations has surfaced. Yubico defends its model by emphasizing hardware-based protections in certified secure chips, which resist common attacks even if source code were exposed on less robust microcontrollers. Nonetheless, the absence of full firmware audits—unlike open-source hardware—means users must weigh vendor reputation against the principle of verifiable security, with some experts advocating diversified authentication ecosystems to mitigate single-vendor risks.

Involvement in Privacy Advocacy and Activism

Yubico, the developer of YubiKey, has supported advocacy through its Secure it Forward initiative, which donates up to 5% of YubiKeys purchased via its online store to nonprofit organizations focused on , freedom of expression, and . Launched to provide phishing-resistant tools to at-risk users, the program has distributed keys to groups combating and protecting journalists, enabling secure access to sensitive data without reliance on vulnerable or app-based methods. In 2019, Yubico donated hundreds of YubiKeys to pro-democracy protesters following a request from activists facing heightened cyber threats, including hacking attempts aimed at doxxing and account takeovers. This action provided hardware-based to safeguard communications and online identities amid political unrest, demonstrating a direct response to activist needs for robust tools against state-sponsored risks. The company extended its efforts with the Yubico for Free Speech Program in August 2020, targeting nonprofits and individuals defending and online security. This initiative has supplied YubiKeys to organizations like the , which uses them for phishing-resistant to protect journalists' accounts and sources. Similarly, the International Service for Human Rights (ISHR) and the ISC Project have integrated YubiKeys to secure confidential reporting on abuses, underscoring Yubico's role in equipping advocacy groups with verifiable, hardware-enforced measures. These donations prioritize practical enablement over direct , focusing on distributing to mitigate real-world threats like credential , which empirical data shows accounts for over % of breaches in activist contexts. While Yubico's corporate announcements highlight these as commitments to "," independent verification from recipient organizations confirms the tools' deployment in high-stakes privacy defense, though critics note such programs may serve dual purposes of brand enhancement alongside genuine support.

References

  1. [1]
    Discover YubiKey 5 | Authentication for Secure Login | Yubico
    Multi-protocol security key, eliminate account takeovers with strong two-factor, multi-factor and passwordless authentication, and seamless touch-to-sign.
  2. [2]
    YubiKey Authentication Standards and Options
    View the variety of authentication protocols YubiKeys work with to provide secure authentication and security to sensitive customer and user data.Missing: features | Show results with:features
  3. [3]
    YubiKeys | Two-Factor Authentication for Secure Login
    YubiKey Bio Series supports biometric authentication using fingerprint recognition for secure and seamless passwordless logins. Built primarily for desktop and ...YubiKey 5 Series · Yubico Authenticator · How the YubiKey Works
  4. [4]
    Why we designed the YubiKey the way we did
    Feb 26, 2020 · The first YubiKey was launched in 2008, inspired by the word 'ubiquity' and with the mission to make simple and secure logins available for ...
  5. [5]
    Yubico Company History
    Yubico is awarded a Swedish government innovation grant for developing the YubiKey NEO, a more advanced YubiKey including NFC, and new ideas on how to use ECC ...
  6. [6]
    MFA: YubiKey Facts & Purchasing Guide
    YubiKey 5 FIPS Series · Certified to meet FIPS 140-2 compliance requirements for systems that interact with US government agencies. · Stamped with the word “FIPS” ...
  7. [7]
    About Yubico
    Timeline. 2007. Yubico was founded in Stockholm, Sweden, by Stina and Jakob Ehrensvärd to develop the YubiKey 1.0 which was the world's first one touch, one ...
  8. [8]
    How YubiKeys are made: Security at scale | Yubico
    Sep 30, 2020 · The first YubiKey was manufactured in Sweden in 2008. A few years later, part of our team moved from Stockholm to California, ...<|control11|><|separator|>
  9. [9]
  10. [10]
    What YubiKey Do You Have? | Yubico
    Legacy products ; YubiKey Plus · 2014-2015 ; YubiKey VIP · 2011-2017 ; YubiKey NEO · 2012-2018 ; YubiHSM 1 · 2015-2017.
  11. [11]
    YubiKey 5 Series First Multi-Protocol Security Keys to support FIDO2
    Sep 24, 2018 · Yubico, today announced the launch of the YubiKey 5 Series, the industry's first multi-protocol security keys supporting FIDO2/WebAuthn.
  12. [12]
    Yubico Launches the World's First Lightning Security Key, the ...
    Aug 20, 2019 · Yubico announced general availability of YubiKey 5Ci, the world's first security key designed with both USB-C and Lightning connectors on a ...Missing: timeline | Show results with:timeline
  13. [13]
    Yubikey: the first FIPS validated Multi-Protocol Security Key
    May 3, 2021 · Yubico Launches YubiKey 5 FIPS Series, Industry's First FIPS 140-2 Validated Multi-Protocol Security Keys to Enable Passwordless Authentication.Missing: timeline | Show results with:timeline
  14. [14]
    Yubico Launches First YubiKeys With Biometric Authentication
    Oct 4, 2021 · Yubico introduces YubiKey Bio Series for passwordless and 2FA logins, offering biometric security in USB-A/C formats.Missing: timeline | Show results with:timeline
  15. [15]
    YubiKey 5 Series and Security Key Series with new 5.7 firmware
    May 21, 2024 · Now available for purchase: YubiKey 5 Series and Security Key Series with new 5.7 firmware · YubiKey 5 Series (multi-protocol) · Security Key ...
  16. [16]
    Shipping now: YubiKey Bio Series - FIDO Edition with new features ...
    Aug 13, 2024 · Following the release of 5.7 firmware on the YubiKey 5 Series and Security Key Series in May, we are excited to announce that YubiKey Bio Series ...
  17. [17]
    Yubico More than Doubles Global Reach of YubiKeys for ...
    May 20, 2025 · Now totalling 199 locations (175 countries and 24 territories), this more than doubles existing delivery coverage of YubiKeys to both office and remote users ...Missing: advancements milestones
  18. [18]
    CEO Corner: Maintaining stable growth while navigating global ...
    May 22, 2025 · The beginning of 2025 saw Yubico honored with multiple industry award recognitions, including 'Best Security Company of the Year' in the Cyber ...Missing: acquisitions 2020-2025
  19. [19]
    Yubico delivers PIN advancements with new YubiKey 5 – Enhanced ...
    Jul 15, 2025 · Yubico delivers PIN advancements with new YubiKey 5 – Enhanced PIN keys · PIN Complexity turned on automatically · Minimum PIN Length set to 6 ...Missing: milestones | Show results with:milestones
  20. [20]
    Firmware Overview — YubiKey Technical Manual documentation
    The new 5.7. firmware for the YubiKey 5 Series has a number of new and improved features that are available for the first time on the multi-protocol YubiKey 5.Missing: 2020 | Show results with:2020
  21. [21]
    Release Notes - Yubico Developers
    Version 7.2.3 includes UI improvements, keyboard shortcut help, and fixes for Linux and Android. Version 7.2.0 added toggle application support and ...
  22. [22]
    Dashlane and Yubico Launch Passwordless Vault Login with ...
    Oct 14, 2025 · Dashlane and Yubico (YUBICO) announced on October 14, 2025 a partnership to enable phishing-resistant, passwordless vault login using FIDO2 ...
  23. [23]
    Works with YubiKey Spotlight: Expanded partnerships redefining ...
    Jan 23, 2025 · 2024 was an exciting year for Yubico and our partners. Together, we achieved remarkable milestones, launching innovative solutions and forging stronger ...Missing: advancements | Show results with:advancements
  24. [24]
    [PDF] interim-report-q2-2025-250814.pdf - Yubico Investor Relations
    Aug 13, 2025 · The event will offer an in-depth look at our business model, key growth drivers, and strategic priorities, along with opportunities for Q&A with ...Missing: acquisitions | Show results with:acquisitions
  25. [25]
    YubiKey Hardware - Yubico Developers
    While YubiKeys come in a number of different form-factors, each is built around the same core chipset and firmware, allowing a uniform experience regardless of ...Missing: components | Show results with:components
  26. [26]
    YubiKey Technical Manual — YubiKey Technical Manual documentation
    **Summary of YubiKey Series 5 Hardware Architecture and Specifications:**
  27. [27]
    [PDF] CSPN Security Target - l'ANSSI
    2.3 YubiKey architecture. All devices in the YubiKey 5 Series are composed of the following hardware components: ○ Physical connector (USB-A, USB-C or ...<|separator|>
  28. [28]
  29. [29]
    [PDF] Yubico, Inc. YubiKey 4 Cryptographic Module
    The Module is the core component for authenticators in the YubiKey 4 product family. The Module meets FIPS 140-2 overall Level 2 requirements. Table 1.1 ...
  30. [30]
    Protocols and Applications — YubiKey Technical Manual ...
    Device Support: This article applies to Yubico devices that support the FIDO2 protocol, like the YubiKey 5 Series, YubiKey 5 FIPS Series, and Security Key ...FIDO2 · Smart Card (PIV Compatible) · OATH · OpenPGP
  31. [31]
    Physical Interfaces: USB, NFC, Apple Lightning® — YubiKey ...
    The YubiKey presents itself as a USB composite device in addition to each individual USB interface. USB A or USB C or both connectors are supported.
  32. [32]
    How the YubiKey Works | Yubico
    Discover how the YubiKey works. Secure authentication with a YubiKey is simple: plug it into a USB port and touch the button or tap for NFC.
  33. [33]
    [PDF] YubiKey 5 Cryptographic Module
    2.3.2 Authentication Mechanisms. The module supports role-based authentication mechanisms for the Cryptographic Officer and. User. Table 6 - Authentication ...
  34. [34]
    YubiKey Manager | Yubico
    Use the YubiKey Manager to configure FIDO2, OTP and PIV functionality on your YubiKey on Windows, macOS, and Linux operating systems.
  35. [35]
    Introduction — YubiKey Manager (ykman) CLI Guide documentation
    The ykman CLI is the premier tool for advanced management and configuration of all YubiKey applications (FIDO2, FIDO U2F, PIV, Yubico OTP, YubiHSM Auth, OpenPGP ...
  36. [36]
    Tools: YubiKey Manager (ykman) and PIV Tool - Yubico Developers
    YubiKey Manager / ykman. The YubiKey Manager, also referred to as ykman, is a general purpose tool for the configuration of all of the functions of the YubiKey.
  37. [37]
    YubiKey Personalization Tool | Yubico
    The YubiKey Personalization Tool provides the ability to perform batch programming, check firmware, and custom configure your YubiKey. Learn more today.
  38. [38]
    yubikey-personalization - Yubico Developers
    The YubiKey Personalization package contains a library and command line tool used to personalize (ie, set a AES key) YubiKeys.
  39. [39]
    YubiKey Software Downloads | Yubico
    Free & open source tools. Access links to our free and open source software tools. Use these resources to manage or configure your YubiKeys.
  40. [40]
    YubiKey as a Service | Yubico
    Enter your own company data to create a custom Dynamic TEI study and instantly see how Yubico's solutions can help your organization! Create my custom study.
  41. [41]
    Modhex Converter - Yubico Developers
    Modhex is similar to hex encoding but with a different encoding alphabet. The reason is to achieve a keyboard layout independent encoding.
  42. [42]
    modhex.1 - Yubico Developers
    Encode/decode modhex data DATA to binary and hex. OPTIONS The string DATA is the data to convert. EXAMPLES ModHex encode ASCII-string "test": modhex testMissing: specification | Show results with:specification
  43. [43]
    Using YubiKeys with various keyboard layouts - Yubico Support
    Jun 14, 2022 · The recommended “best practice” is to switch to a US standard keyboard layout when entering the OTP and switching back when done.Missing: format | Show results with:format
  44. [44]
    OTPs Explained - Yubico Developers
    The YubiKey OTP generation is made up of the following fields, encrypted with a unique AES-128 bit key. The result is the 32 character modhex string included ...
  45. [45]
    [PDF] The YubiKey Manual | RCDevs
    A deeper description of the Modhex encoding scheme can be found in section 6.2. 2.1.4 The Yubico OTP part. The OTP part comprises 128 bits AES-128 encrypted ...
  46. [46]
    FIDO2 Credentials
    In FIDO2, a credential is a public key. The private key partner is generated on the YubiKey (in the secure element) and never leaves the device. When ...Make A Credential... · Make Credential Parameters · Get An Assertion...
  47. [47]
    Technical Deep Dive - Yubico Developers
    Enhanced Security Separation: Asymmetric private keys never leave their respective devices (host or YubiKey), maintaining strong security boundaries.
  48. [48]
    Yubico's Take on U2F Key Wrapping
    Nov 14, 2014 · However, we think that our approach offers some benefits: most obviously, the private keys never leave the U2F device, in any form. And ...
  49. [49]
  50. [50]
    Security Advisory YSA-2024-03 - Yubico
    Sep 3, 2024 · A vulnerability was discovered in Infineon's cryptographic library, which is utilized in YubiKey 5 Series, and Security Key Series with firmware prior to 5.7.0.Missing: chipset | Show results with:chipset
  51. [51]
    EUCLEAK - NinjaLab
    Sep 3, 2024 · All YubiKey 5 Series (with firmware version below 5.7) are impacted by the attack and in fact all Infineon security microcontrollers (including ...Missing: documented | Show results with:documented<|separator|>
  52. [52]
    CVE-2025-29991 : Yubico YubiKey 5.4.1 through 5.7.3 before 5.7.4 ...
    Apr 3, 2025 · CVE-2025-29991 : Yubico YubiKey 5.4.1 through 5.7.3 before 5.7.4 has an incorrect FIDO CTAP PIN/UV Auth Protocol Two implementation.
  53. [53]
    YSA-2025-02 - Yubico
    Apr 2, 2025 · Easy-to-use, secure authentication With YubiKey there's no tradeoff between great security and usability Why YubiKey security-advisory ...
  54. [54]
    Trying to break a Yubikey - Keir Finlow-Bates
    Apr 30, 2025 · In this article, I document eight attempts at hacking a Yubikey. Although I failed to find a significant flaw, this report does show you how a hacker might go ...
  55. [55]
    Security advisories | Yubico
    Security advisory: YSA-2015-1. YubiKey NEO OpenPGP PIN validation logic issue. Read more on how Yubico rates the severity of security issues. Sign up to receive ...
  56. [56]
    CVE-2024-45678 Detail - NVD
    Sep 3, 2024 · Yubico YubiKey 5 Series devices with firmware before 5.7.0 and YubiHSM 2 devices with firmware before 2.4.0 allow an ECDSA secret-key extraction attack.
  57. [57]
    Issue rating system | Yubico | YubiKey
    Yubico uses four severity ratings to describe security issues in its software, services, and devices: Minor, Moderate, High, Critical. Each rating has ...Missing: responses | Show results with:responses
  58. [58]
    5.7 Firmware Specifics — YubiKey Technical Manual documentation
    Firmware 5.7 includes CTAP 2.1, FIDO2 extensions, Enterprise Attestation, unicode PIN support, and new RSA-3072/4096 and Ed25519/X25519 key types.CTAP 2.1 Feature Summary · Minimum PIN Length and... · Always User Validation
  59. [59]
    YubiKey for securing Enterprise | Yubico
    Use cases. Hybrid & remote workers · Secure privileged users · Mobile restricted · Shared workstations · Secure end customers. Technologies. Microsoft ecosystem ...
  60. [60]
    Microsoft MFA | YubiKeys | Yubico
    Microsoft Entra ID and YubiKeys secure enterprises, small businesses, federal agencies and consumers with phishing-resistant MFA with simple and secure sign in ...
  61. [61]
    Reference customers | Yubico
    View our reference customers and case studies. Yubico today protects more than 4000 businesses, 10M+ users across nearly 160 different countries.Proven at scale at Google · Hyatt Hotels leverages... · Naftogaz case study
  62. [62]
    Datadog leads in authentication best practices using YubiKey
    Datadog's company-wide rollout of strong authentication through YubiKeys helps protect access to data, applications, and services.
  63. [63]
    Yubico | YubiKey Strong Two Factor Authentication
    The YubiKey is hardware authentication reimagined. Secure the identities of your employees and users, reduce support costs, and experience an unmatched user ...YubiKeys | Two-Factor... · Buy YubiKeys · YubiKey | Yubico · Set up your YubiKey
  64. [64]
    Google Accounts | Yubico
    The YubiKey is a hardware security key that provides strong one-touch authentication, and works seamlessly with Google Accounts.
  65. [65]
    Microsoft accounts | Yubico
    Using a Microsoft account with a YubiKey gives you quick and easy access to services such as Microsoft 365, OneDrive, Xbox Live, Bing and more.<|control11|><|separator|>
  66. [66]
    Facebook 2FA with Yubikey For Account Security | Yubico
    Facebook two factor authentication (2FA) can be done using YubiKey to secure your account. Even with your password, hackers can't access your account.
  67. [67]
    Fast and Simple Two-Factor Authentication | YubiKey | Yubico
    Use cases. Hybrid & remote workers · Secure privileged users · Mobile restricted · Shared workstations · Secure end customers. Technologies. Microsoft ecosystem ...
  68. [68]
    Passkey use cases - Yubico Developers
    Consumer use cases. These are use cases that can be utilized by the broad consumer space. Apps that can be downloaded onto personal devices such as: social ...
  69. [69]
    Yubico joins FIDO Alliance
    May 7, 2013 · Yubico has joined FIDO Alliance as a board member, and will be a part of the Universal 2nd Factor (U2F) working group that Google is creating ...
  70. [70]
    U2F - Yubico Developers
    U2F was created by Google and Yubico, with contribution from NXP, and is today hosted by the open-authentication industry consortium FIDO Alliance.
  71. [71]
    Yubico - FIDO Alliance
    Founded in 2007, Yubico is privately held, with offices in Sweden, UK, Germany, USA, Australia, and Singapore. For more information: www.yubico.com.Missing: history | Show results with:history<|separator|>
  72. [72]
    FIDO2 Passwordless Authentication | YubiKey | Yubico
    FIDO2 – an open authentication standard​​ Yubico is a core contributor to the FIDO2 open authentication protocol. FIDO2 is the evolution of FIDO U2F, and offers ...
  73. [73]
    A Big Day for the Internet: W3C Standardizes WebAuthn | Yubico
    Mar 4, 2019 · We contributed to this standard to help as many people as possible stay safe online. Moving forward, the YubiKey will be valued as a high ...
  74. [74]
    WebAuthn Introduction - Yubico Developers
    The WebAuthn API enables servers to register and authenticate users using public key cryptography instead of a password.
  75. [75]
    Yubico U2F YubiKeys Earn FIDO Certification - Yahoo Finance
    May 21, 2015 · "Yubico has been a driving force behind the development and adoption of the U2F protocol. We congratulate them for meeting the requirements of ...
  76. [76]
    Passkeys - Yubico Developers
    For years Yubico has been contributing to the WebAuthn standard, which is the protocol that enables secure authentication using passkeys. Yubico's contribution ...
  77. [77]
    What is FIDO2? | YubiKey
    May 24, 2018 · U2F was developed by Yubico and Google, and contributed to the FIDO Alliance after it was successfully deployed for Google employees. The ...
  78. [78]
    Year-end Report 1 January – 31 December 2024 – Yubico
    Feb 13, 2025 · Net sales increased by 27.3 percent to SEK 2,326.2 (1,827.3) million, corresponding to an increase of 27.6 percent in local currencies ...<|control11|><|separator|>
  79. [79]
    [PDF] Yubico — Quarterly Report January-March 2025 Making the internet ...
    May 12, 2025 · First quarter. • Net sales increased by 24.9 percent to SEK 623.1 (498.9) million, corresponding to an increase of 22.4 percent in local ...
  80. [80]
    Yubico Expands Global Reach of YubiKeys for Enterprises to 175 ...
    May 27, 2025 · This expansion enables us to meet growing demand and accelerates adoption, enabling faster, more affordable delivery of pre-configured YubiKeys ...Missing: advancements milestones
  81. [81]
    Yubico Statistics And Facts, Market Share and Key Features (2025)
    Oct 12, 2025 · Yubico Statistics: A report published by Enlyft stated that in 2025, almost 298 companies are currently using Yubico.
  82. [82]
    2025 Global State of Authentication survey: A world of difference in ...
    Sep 30, 2025 · Yubico's 2025 Global State of Authentication survey: Highlighting a world of difference in cybersecurity habits.
  83. [83]
    Hardware Security Modules Market Size, Share Report, 2030
    The global hardware security modules market size was estimated at USD 1.56 billion in 2023 and is projected to reach USD 4.35 billion by 2030, growing at a CAGR ...
  84. [84]
    The Total Economic Impact™ Of Yubico YubiKeys - Forrester
    YubiKeys reduce security breach exposure by 99.9%, drive business growth, and have a net present value of $3.2 million with a 203% ROI.Risk Reduction, Business... · Executive Summary · Key Findings
  85. [85]
    What Are the Business Benefits of YubiKeys? - Threatscape
    As noted, following adoption of YubiKeys, the risk of phishing and credential thefts alone was slashed by 99.9 per cent, and interviewees reported high levels ...The Business Benefits Of... · Strengthened Security · Business GrowthMissing: statistics | Show results with:statistics
  86. [86]
    [PDF] Is Real-time Phishing Eliminated with FIDO?
    May 25, 2021 · Abstract. FIDO's U2F is a web-authentication mechanism designed to mitigate real-time phishing—an attack that undermines.
  87. [87]
    Secure Hardware vs. Open Source - Yubico
    May 16, 2016 · Yubico's hardware is not open-sourced, but uses secure chips with built-in countermeasures, unlike standard microcontrollers, to protect ...Missing: concerns | Show results with:concerns
  88. [88]
    Bad News: Two-Factor Authentication Pioneer YubiKey Drops Open ...
    May 16, 2016 · And that's not possible when it's closed source. Yubico, also, doesn't seem to have reacted well to people complaining. After one commenter ...
  89. [89]
    I must, sadly, withdraw my endorsement of Yubikey 4 devices
    May 13, 2016 · [0] - https://github.com/Yubico/ykneo-openpgp/issues/2#issuecommen... ... The simplest scenario isn't that YubiKey 4 went closed source to support ...
  90. [90]
    What's the consensus on Yubico/Yubikey considering they went ...
    Nov 27, 2023 · What could be the possible issues with closed source firmware? Backdoors for false/emulated authorization into your accounts? Tracking?Why isn't Yubikey open source? - RedditYubikey security issues - RedditMore results from www.reddit.comMissing: transparency | Show results with:transparency
  91. [91]
    Yubico: Secure Hardware vs. Open Source - Hacker News
    May 17, 2016 · First, the reader required to use them in a transparent manner does not fit with the form factor of a laptop. Second, they're obviously less ...
  92. [92]
    Secure it Forward - Yubico
    Through Secure it Forward, Yubico donates up to 5% of the number of YubiKeys purchased on Yubico.com to nonprofit organizations defending human rights, freedom ...
  93. [93]
    Making digital security a right: Inside Yubico's Secure it Forward ...
    Sep 26, 2025 · The organization conducts research, policy analysis, advocacy, and campaigns to combat censorship, protect journalists, expand civic space, and ...
  94. [94]
    Swedish tech firm Yubico hands Hong Kong protesters free security ...
    Oct 10, 2019 · A Swedish tech company renowned for encryption has donated hundreds of security keys to Hong Kong's protest movement after an activist sought help in repelling ...
  95. [95]
    Hong Kong: Swedish tech firm Yubico donates security keys to ...
    A Swedish tech company renowned for encryption has donated hundreds of security keys to Hong Kong's protest movement after an activist sought help in repelling ...
  96. [96]
    Yubico Free Speech Program Arms Nonprofits With Authentication
    Aug 25, 2020 · Yubico for Free Speech Program is designed to defend digital privacy, online security, and free speech for at-risk individuals and nonprofit ...
  97. [97]
    Freedom of the Press Foundation protects press freedom ... - Yubico
    The YubiKey supports phishing-resistant MFA and passwordless authentication, offering the highest level protection for a journalist's identity, accounts and ...
  98. [98]
    The ISC Project protects human rights reporting with the YubiKey
    The ISC Project protects at risk organizations where confidentiality and security are top concerns for members, see how they're implementing the yubikey.Missing: involvement | Show results with:involvement
  99. [99]
    Donating YubiKeys globally to those who need it most - Yubico
    Mar 10, 2022 · We've been working with individuals, enterprises, and those most at-risk, to donate YubiKeys to help ensure their digital safety.
  100. [100]
    Protecting High-Risk Users One Security Key at a Time
    Mar 10, 2025 · One of the best things about a YubiKey is how simple, yet secure, it is to use. Instead of waiting for a code or opening an app, you just simply ...