The BEST Way To Secure Your Accounts...

preview_player
Показать описание
Repair Tools ( Regularly Updated - With Soldering Tools ) :

Join this channel to get access to perks:

Thank you for watching!

Social:

(The Following contains affiliate links)

My Repair Tools :

Filming Gear:

Support The Channel By Shopping On Amazon/Aliexpress Through These Links:

Phone Repair Guru assumes no liability for any damage caused to your phone as a result of any of the information contained in this video.

Do not attempt unless you are open to the possibility of further damaging your device.
Рекомендации по теме
Комментарии
Автор

This is your sign to start taking internet security more seriously :)

PhoneRepairGuru
Автор

The Security Trinity:
1. Something you know (a passcode)
2. Something you have (a 2FA key)
3. Something you are (biometric scan)

Shoob__
Автор

Friendly reminder to anybody who uses these always buy a backup

brad
Автор

Thief:
"ok...now i need his finger too"😂

kimathikenamu
Автор

Love your content ‘PRG’ been watching you since 2022 ❤

sherlockbuddy
Автор

I can't unsee the hole in your prg mat 😭

thishandleisntavaiIable
Автор

lol, in my job everyone use them and I thought that no one knew them outside my job (as i had never seen them in social media until now). Great vid!

jeysonsantacruz
Автор

Essential security tip: Encrypt your disk. If someone steals your physical device, it doesn’t matter how secure your login password is or ehat OS you’re using, taking the storage device out - even if that means unsoldering it - will always be a foolproof way of stealing data from an unencrypted disk, and if you don’t encrypt your disk AND have no security for the BIOS/boot menu, it’s as easy as plugging in a Linux flash drive and running a simple cp command in the terminal. Encrypt your drives, guys.

localhost
Автор

To be clear this does 2 factors of authentication: Something you have, and something you are. You'd need to use this in addition to a password (something you know) for 3 factor authentication. Still I think this thing is awesome.

Lydia
Автор

no they can't just use it. You can also create a pin on that device if I am not completely wrong. And they still need to know your mail and password, which is hard. So someone needs to steal that key from you AND know your logins. So the normal key is more than enough

NebihTV
Автор

I have to do a rain dance and turn in a circle the number of times indicated by my authenticator app and spit each number of my four digit passcode seperated by a specific goose honk.

Derfboy
Автор

That is why you get 3 of them...
I have one that stays in my home PC one in my wallet and one in my firesafe.
If you lose one., .. you can still login and remove the lost key.
(Just remember to register all 3 with your accounts)

TheCynysterMind
Автор

Well you can, and probably should set a PIN to that Yubikey. So even if someone steals your key, they must know your login, your password, have your Yubikey and know PIN for your Yubikey to log in. And after few wrong PIN tries, it gets blocked.
So yeah, GL

Klusio
Автор

Had these at work, a magnet can easily bypass the FP scanner, rendering it useless, cause actually it doesn't scan your fingerprint, it just needs a contact.

Gimmemoar
Автор

You can set a PIN on your Yubikey 5 NFC

aquatrax
Автор

You should always prefix the generated code with a seed you type before touching the ubikey.

Mostly-Harmless
Автор

Does it store it locally? Does it need WiFi?

(Edit: I asked if it needed WiFi because sometimes storage devices can be cloud based but most of the time stored locally)

Reckless
Автор

Only issue with this model that has a fingerprint sensor is if this key is lost and picked up by a skilled person he could potentially copy the fingerprint on the key since we leave our prints wherever we touch that includes the key fingerprint sensor. If this key also has support for a pin I would use that instead for the people who already bought this

robgha
Автор

Huh, can't we just use the built in fingerprint scanner or face scanner on most phones and laptops and use the passkey function, which many websites offer?

tomole
Автор

The user name field, example your email address is also part of the authentication process. All must match to access.

ProAllied
visit shbcf.ru