Hardware Auth Keys

101 Words

There are all kinds of websites and all kinds of apps. They all want you to register you as an user and provide personalized services. That’s great. But along with registration comes identity and authentication mechanisms. Traditionally it has been usernames and passwords. It was such an innocent world where just that was enough. But we are not in that world anymoe.

An ideal user is expected to

  • use unique username/passwords at each location.
  • always verify the authenticity of the website or app before entering username/password.
  • keep the computer/phone secure from any malware that can snoop the username/password while being entered.