Security Token Research- the Good, the Bad, and the Ugly

The Beginning

In May, we decided to figure out the world of online security and try to build our own second-factor authentication token. I started learning anything and everything I thought could help me in this quest, and thus, decided to look into what’s already on the market.

I decided to look on Amazon, and document the pros and cons of Amazon’s options. My main concerns where: what’s good? what’s missing? what can be improved? and how it can be improved?

 

NAME DESCRIPTION PROS CONS AVG. RATING (/5) LINK TO PRODUCT
Digipass Secureclick FIDO U2F Security Key -USB token with bluetooth bridge

-2 year lifespan

-works on Windows, Mac OS X, Linux

-has different coloured status indicator lights -tamper sticker ripped off when arrived

-bluetooth has short range

-battery comes almost completely drained

-unreliable, complicated set up

2.9 https://www.amazon.com/DIGIPASS-SecureClick-FIDO-U2F-Security/dp/B01M0DPK3K/ref=sr_1_1?s=electronics&ie=UTF8&qid=1531003319&sr=1-1&keywords=digipass+secureclick+fido+u2f&dpID=41B9W72j09L&preST=_SX300_QL70_&dpSrc=srch
Aluminum Folding U2F USB by Thetis -USB token

-doesn’t support one-time passwords

-works on Windows, Mac OS X, Linux

-easy set up

-durable

-small

-can’t use multiple keys (of this model) for the same account

 

4.4 https://www.amazon.com/Thetis-Universal-Authentication-Protection-SalesForce/dp/B06XHTKFH3/ref=sr_1_1?s=electronics&ie=UTF8&qid=1531003369&sr=1-1&keywords=aluminum+folding+u2f+usb&dpID=41yJruItpAL&preST=_SY300_QL70_&dpSrc=srch
Yubikey 4 Nano -waterproof

-crush resistant

-works on Windows, Mac OS X, Linux

-easy to configure

-“does the job”

-must download instructions

-hard to pull out of slot without a lanyard

-if you bump it, it types on the screen

-“so small your 2 year old may accidentally swallow”

4.2 https://www.amazon.com/Yubico-FBA_Y-159-YubiKey-4-Nano/dp/B018Y1XXT6/ref=sr_1_1_sspa?s=electronics&ie=UTF8&qid=1531003394&sr=1-1-spons&keywords=yubikey+4+nano&psc=1
Feitian ePass NFC Security Key -near field communication

-can store multiple key pairs

-has one-time password support

-durable -doesn’t work on apple products?

-the near field communication is iffy

3.6 https://www.amazon.com/Feitian-ePass-NFC-FIDO-Security/dp/B01M1R5LRD/ref=sr_1_1?s=electronics&ie=UTF8&qid=1531003418&sr=1-1&keywords=feitian+epass&dpID=41eY7u7wu8L&preST=_SY300_QL70_&dpSrc=srch
U2F Zero

(This is the model we are building! The creator graciously put all instructions online)

-opensource

-no drivers

-works great

-easy set up

-cheap

-durability? (exposed components on PCB)

-doesn’t come with instructions

4.3 https://www.amazon.com/U2F-Zero/dp/B01L9DUPK6/ref=sr_1_2?s=electronics&ie=UTF8&qid=1531003442&sr=1-2&keywords=u2f+zero&dpID=417OzMjYqkL&preST=_SX300_QL70_&dpSrc=srch
HyperFido Mini -FIDO U2F certified

-works on Windows, Mac OS X, Linux

-works fine -LED light too bright

-casing isn’t durable

3.6 https://www.amazon.com/HyperFIDO-Mini-U2F-Security-Key/dp/B01LZO0WE9/ref=sr_1_1?s=electronics&ie=UTF8&qid=1531003462&sr=1-1&keywords=hyperfido+mini

From these review, we can see that the main problem across the board was ease of use. Many keys didn’t even come with a set of instructions! Also, the size and shape of the token was an issue.

 

The main problem with security tokens at this point in time is that there isn’t much support yet. Not many sites allow a physical second factor device (or even any type of second factor). This means that people don’t feel the need to learn about or invest in a token. However, in the near future, this will be over a TRILLION dollar market space. The race is on to make better two-factor tokens.