|商品尺寸||4.5 x 1.8 x 0.3 cm; 4.54 克|
|Is Discontinued By Manufacturer||不是|
Yubico *钥匙 - U2F 和 FIDO2，USB-A，双因素身份验证
Yubico 的*密钥结合了基于硬件的验证、公共密钥加密和 U2F 和 FIDO2 协议，消除了客户接管。 它为 Facebook、Gmail、GitHub、Dropbox、Dashlane、Salesforce、Duo、Docker、Centrify 以及数百多多种 U2F 和 FIDO2 兼容服务。
不需要额外的软件 ， 而且认证方便 、 快速 、 可靠 。 只需将*钥匙插入到 USB-A 插槽，并通过简单的触摸进行验证。
|5 星 (0%)||0%|
|4 星 (0%)||0%|
|3 星 (0%)||0%|
|2 星 (0%)||0%|
|1 星 (0%)||0%|
There may be a solution which I have yet to find. If so, i will update this.
Note this does require you have a compatible browser; on Windows 10 this means chrome.
Edge does not work with this key as of build 17704 or earlier (it seems the FIDO support in edge is lacking)
This key does not work with Windows 10 Hello, the support does not seem to be in windows for FIDO2 keys at this time (build 17704)
Windows 10 Hello will work with yubikeys (they use the CCID format); note this key is NOT a yubikey (see its not called that in the description - yup well done marketing at confusing everyone! - yubikeys support things like PIV and CAK, this does not, and is why it is cheaper).
If you need windows 10 hello now, buy the yubikey 4 (it only supports FIDO UDF - but it will work).
Will update if and when FIDO2 support is in Windows 10.
As you can see from the pictures they look like they are the real deal but in Yubikey manager they look like they have the firmware of the cheaper model, non-NFC. They work as USB security keys just fine but that's not why I got them.
Initially I thought my phone has a problem but tried another one and I got the same negative result. I then scanned other NFC items and my phone read those just fine.
I then ordered the more expensive Yubikey 5 NFC just to see if that one behaves differently. It arrived one day later and worked through the box, I didn't even need to open it. I used NXP Taginfo app to get information.
Yubikey support asked me for more information but they stopped replying.
Still not sure if these are genuine or they made a manufacturing mistake. If you don't need NFC you are better off buying the cheaper model.
I am very disappointed with the outcome
While SMS codes for 2FA are better than nothing, they can be circumvented if a hacker uses "SIM swapping".
A Yubikey physical key is something you keep on your person. When you login to a website and are prompted, you put the key in the USB socket, and press the button when it lights up. If someone got your password from a breach, they'll be prompted for the Yubikey and they will be stymied.