Apricorn Aegis Padlock, DataLocker DL3, Lenovo ThinkPad USB 3.0 Secure Drive, Rocstor Rocsafe MX

Google has been offering support for two-step verification for years, but now there’s another option for proving you are who you say you are. You can now use a physical USB device plugged into your computer to access your Google account via Chrome in addition to your password. Google calls usb security this Security Key. Using Security Key means your physical presence (or at least the presence of your keychain) is needed to log into Google, making it all but impossible for a remote attacker to gain access to your account, protecting you from most of the malicious hacks you hear about.

Unlike connected tokens, contactless tokens form a logical connection to the client computer but do not require a physical connection. The absence of the need for physical contact makes them more convenient than both connected and disconnected tokens. As a result, contactless tokens are a popular choice for keyless entry systems and electronic payment solutions such as Mobil Speedpass , which uses RFID to transmit authentication info from a keychain token. However, protect usb there have been various security concerns raised about RFID tokens after researchers at Johns Hopkins University and RSA Laboratories discovered that RFID tags could be easily cracked and cloned. 3 Another downside is that contactless tokens have relatively short battery lives; usually only 5-6 years, which is low compared to USB tokens which may last more than 10 years. citation needed Though some tokens do allow the batteries to be changed, thus reducing costs.

It’s more like you buy a board online from Soekris, get an old PC on Craigslist, or whatever. Then, you download the free CD. Then, you follow steps you find in Google for the different parts I mentioned. No soldering required. Just time and effort for each secure usb extra bit of assurance. The best way to deal with the scripts and such is to crowdsource some experts to build all that for free or for profit. Then, long as the hardware exists (or similar hardware does) the users can buy/download that and simply run it.usb security lock

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s