Deliver to Morocco
IFor best experience Get the App
About HyperFido The HyperFido U2F Security key enables seamless authentication to websites and browser based applications such as Google's GMail. The HyperFido is fully compliant with the FIDO Alliance U2F specification. About FIDO U2F How it works: User carries U2F device with built-in support in web browsers User presents U2F device Website can simplify password (e.g. – 4 digit pin) The user logs in with a username and password as before. The service can also prompt the user to present a second factor device at any time it chooses. The strong second factor allows the service to simplify its passwords (e.g. 4–digit PIN) without compromising security. During registration and authentication, the user presents the second factor by simply pressing a button on a USB device or tapping over NFC. The user can use their FIDO U2F device across all online services that support the protocol leveraging built–in support in web browsers. The FIDO protocols use standard public key cryptography techniques to provide stronger authentication. During registration with an online service, the user’s client device creates a new key pair. It retains the private key and registers the public key with the online service. Authentication is done by the client device proving possession of the private key to the service by signing a challenge. The client’s private keys can be used only after they are unlocked locally on the device by the user. The local unlock is accomplished by pressing the button on the HyperFido. About FIDO Alliance The FIDO Alliance Board of Directors includes leading global organizations such as Alibaba, ARM, Bank of America, Discover, Google, Lenovo, MasterCard Microsoft, PayPal and Visa Inc.
M**S
I use this for gmail 2factor auth. Every month ...
I use this for gmail 2factor auth. Every month, gmail freaks out and says "YOU GOT THAT THING?!" I go "I GOT THE THING HERE!" And hackers, they don't got the thing. Hacker's dont got my email either. Get a thing. Keep your mail.
J**S
LINUX - Simple udev setup to make great product work
This HyperFIDO U2F key is small enough to keep in your pocket or purse at all times and never worry about it. It worked great after getting a fast reply from HyperSECU support about the linux udev rules needed (I don't use windows). I had it set up very quickly with Google services and it worked flawlessly. Hopefully, more services will support U2F in the future.If you are wondering, here are the udev rules their awesome support recommended. I created a file /etc/udev/rules.d/96-hyperfido.rules and used the first example below because thankfully, I do not have to deal with systemd. If you are unfortunate enough to have to use systemd, please use the second example.Example 1------------------------------------------------------------------------------------------------# udev rule for non-systemd systems# for using HyperFIDO U2F keySUBSYSTEMS=="usb", ATTRS{idVendor}=="096e|2ccf", ATTRS{idProduct}=="0880", MODE="0660", GROUP="plugdev"------------------------------------------------------------------------------------------------Example 2------------------------------------------------------------------------------------------------# udev rule for systemd system# for using HyperFIDO U2F keyACTION!="add|change", GOTO="u2f_end"KERNEL=="hidraw*", SUBSYSTEM=="hidraw", ATTRS{idVendor}=="096e|2ccf", ATTRS{idProduct}=="0880", TAG+="uaccess"LABEL="u2f_end"-------------------------------------------------------------------------------------------------I am not sure if it would hold up to the abuse of a car keyring due to the plastic construction but for my needs it will last a very long time riding in my pocket!My rating: * * * * *UPDATE 12/16 : I added the latest vendor ID for HyperSECU (2ccf) to the rule set.- ATTRS{idVendor}=="096e"+ ATTRS{idVendor}=="096e|2ccf"
F**A
Excellent, secure product
This is a deceivingly small and light product. It came home in a simple plastic package, without an instructions manual. The closest thing to an instructions manual is the datasheet, which I downloaded from [...] and has all the information I need. Of course, I am supposed to read and understand what FIDO U2F is about before buying a product like this. This product is sturdy, easy to grab with my hands, and the button is easy to press. It also has a green indicator LED.I am using the key under Fedora Linux 23 with Google Chrome 47. I installed the package u2f-hidraw-policy and this product worked perfectly without the need to add udev rules or even reboot. So far I have registered 1 personal Google account, 1 Google Apps for Education account, 1 dropbox account and 1 GitHub account. All of them work perfectly well with this product.In all of these websites, I only insert the key when logging in; the green LED indicator flashes, I tap the button, and I am instantly authenticated. I immediately remove the key and the websites work as expected from then on.I removed SMS authentication on the aforementioned accounts now that I have peace of mind with this Security Key, Google Authenticator codes, and backup security codes.
B**N
this is a great start to lock down Google and other U2F compatable ...
If your just starting on U2F, this is a great start to lock down Google and other U2F compatable websites. Works on all OSes(Windows,OS X, Linux ,UNIX), currently not able to get working with IOS. This key requires Google Chrome Web Browser to function at this time. Chrome WebBrowser for Android or IOS does not appear to be compatable at this time but please research, this may have changed since I looked a number of months back.Like I said, excelent starter U2F key for the price. Just be aware, minor limitations at this time
B**H
Works well once installed. Be very careful inserting or it breaks.
USB port is a bit too large to fit my laptop without shaving some of the plastic off. I destroyed one of these by trying to force it into the USB port. I have purchased a second one because they do work well once installed. Just a bit too fragile and you need to trim some plastic off to fit some USB ports.
S**U
If you want to use the security key on Linux ...
If you want to use the security key on Linux (Ubuntu, Debian, CentOS, ..), follow these instructions:1. Go to [...].rules2. Download or create a copy of the file named 70-u2f.rules into the Linux directory /etc/udev/rules.d/ (if this file already exists, ensure that the content matches the one provided on github.com/Yubico in the previous link)3. Save your file.4. Reboot your system.
E**R
It simply does what it's supposed to do, which is why it's perfect
Is the build quality good? No, but you can already see that. However, for a desktop button to satisfy U2F, it's amazing an amazingly inexpensive solution. I love that it's tactile. I own a Yubikey 4.x and another U2F solution. The Yubikey has no tactile feeling, but it also feels like a tank, which is great for travel. I use this key at home to spare my Yubikey being plugged in all the time and well the more keys you have the less chance of you being locked out if one breaks. A minimum of two keys is advised as you'll have another one to get in to change to your new second key if the other breaks. I suppose one would say this is a great second solution to a more robust primary solution that might stay in a safe of elsewhere whereas this one will stay used a lot until mechanical(?) failure.
T**Y
An Awesome Security key
I found this easy to use and secured my Gmail, Facebook and GitHub account.Pros:+ Small and strong material+ Easy to use.Cons- Won't fit in certain USB ports.Pending- Not sure if this has NFC (as per the product description)
B**A
FIDO U2F Security Key poor usage
It is not of much use. Though I tested it and found working but for me it is not of much use.
V**V
never reachedem
but the item is good
H**A
Five Stars
Nice cheap product.
K**J
Five Stars
Works as suggested
Trustpilot
1 month ago
1 month ago