{"id":242576,"date":"2023-05-02T11:50:13","date_gmt":"2023-05-02T08:50:13","guid":{"rendered":"https:\/\/shop.thekernel.ua\/how-to-choose-a-quality-usb-token-or-security-key"},"modified":"2023-05-02T12:04:36","modified_gmt":"2023-05-02T09:04:36","slug":"how-to-choose-a-quality-usb-token-or-security-key","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/how-to-choose-a-quality-usb-token-or-security-key","title":{"rendered":"How to choose a quality USB token or security key"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.1&#8243; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2019\/05\/Security-Key-NFC-by-Yubico-Laptop-1030&#215;687.jpg&#8221; parallax=&#8221;on&#8221; min_height=&#8221;610px&#8221; custom_margin=&#8221;-160px||-3px||false|false&#8221; custom_padding=&#8221;37px||22px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|auto|0px|auto|false|false&#8221; custom_padding=&#8221;146px||0px|||&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;84px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;|900|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;65px&#8221; text_letter_spacing=&#8221;2px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;|800|||||||&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;65px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;49px&#8221; text_font_size_phone=&#8221;38px&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height_tablet=&#8221;1.8em&#8221; text_line_height_phone=&#8221;1.8em&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; text_text_shadow_style=&#8221;preset1&#8243; header_text_shadow_style=&#8221;preset1&#8243; text_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><b>What is a USB token and how to use it<\/b><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;|5.1%||3%|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.17.1&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;18px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>The concept of<\/b> <b>a USB token<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">Since protecting accounts with a login and password has long been outdated, back in the early 2000s, many manufacturers began to offer<\/span> <span style=\"font-weight: 400;\">USB tokens as an alternative solution<\/span><span style=\"font-weight: 400;\">. These are <\/span><span style=\"font-weight: 400;\">hardware keys<\/span><span style=\"font-weight: 400;\"> for secure authorization and secure storage of personal data. Outwardly, they resemble USB drives <\/span><span style=\"font-weight: 400;\">(flash drives<\/span><span style=\"font-weight: 400;\">), but have significant differences.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Initially,<\/span> <span style=\"font-weight: 400;\">USB tokens<\/span> <span style=\"font-weight: 400;\">in Ukraine were used to store<\/span> <span style=\"font-weight: 400;\">EDS<\/span><span style=\"font-weight: 400;\"> (electronic digital signature). After a law was adopted<\/span><span style=\"font-weight: 400;\">  <\/span><span style=\"font-weight: 400;\">in Ukraine in 2003 preparing the introduction of<\/span> <span style=\"font-weight: 400;\">an EDS<\/span><span style=\"font-weight: 400;\">, it<\/span><span style=\"font-weight: 400;\">became necessary for entrepreneurs to submit reports electronically. In 2008, the submission of electronic reports to the Pension Fund was fixed by law, and the number of those wishing to send reports by mail increased from 40% to 70%. At the same time, according to the law, the signature must be stored on secure media and not transferred to third parties. Perfect for this purpose <\/span><span style=\"font-weight: 400;\">tokens<\/span> <span style=\"font-weight: 400;\">with<\/span> <span style=\"font-weight: 400;\">EDS<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However,<\/span> <span style=\"font-weight: 400;\">USB tokens<\/span> <span style=\"font-weight: 400;\">can store not only<\/span> <span style=\"font-weight: 400;\">digital signatures<\/span><span style=\"font-weight: 400;\">, but also passwords, seals, digital certificates,<\/span> <span style=\"font-weight: 400;\">electronic keys<\/span><span style=\"font-weight: 400;\">, biometric data, etc. Therefore,<\/span> <b>tokens are<\/b> <span style=\"font-weight: 400;\">great<\/span> <b>for protecting<\/b> <span style=\"font-weight: 400;\">digital information and<\/span> <b>secure authorization on devices or services<\/b><span style=\"font-weight: 400;\">, including<\/span> <b>for two-step, two-factor or multifactor authentication<\/b><span style=\"font-weight: 400;\">.<\/span> <\/p>\n<p><span style=\"font-weight: 400;\">\u041d\u043e, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u043c\u043d\u043e\u0433\u043e\u0435 \u0437\u0430\u0432\u0438\u0441\u0438\u0442 \u043e\u0442 \u0442\u0438\u043f\u043e\u0432 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u2014 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u044e\u0442 \u0440\u0430\u0437\u043d\u044b\u0435 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u044b, \u043f\u043e\u0434\u0445\u043e\u0434\u044f\u0449\u0438\u0435 \u0434\u043b\u044f \u0441\u0430\u043c\u044b\u0445 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0446\u0435\u043b\u0435\u0439: \u043a\u0430\u043a\u0438\u0435-\u0442\u043e \u0442\u043e\u043a\u0435\u043d\u044b \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u044b \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u042d\u0426\u041f, \u043a\u0430\u043a\u0438\u0435-\u0442\u043e \u043f\u043e\u0434\u043e\u0439\u0434\u0443\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f \u0432\u0445\u043e\u0434\u0430, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0432 \u041e\u0421 Windows, \u0430 \u043a\u0430\u043a\u0438\u0435-\u0442\u043e \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u043d\u0443\u043c\u0435\u0440\u043e\u0432\u0430\u0442\u044c \u0438 \u0432\u044b\u0434\u0430\u0442\u044c \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u0430\u043c \u0434\u043b\u044f \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0430\u043a\u043a\u0430\u0443\u043d\u0442\u0430\u0445.<\/span><\/p>\n<h2><b>What is the difference between<\/b> <b>a USB token<\/b> <b>and<\/b> <b>a flash drive<\/b><\/h2>\n<hr>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tokens<\/span><span style=\"font-weight: 400;\">, unlike<\/span> <span style=\"font-weight: 400;\">a flash drive<\/span><span style=\"font-weight: 400;\">, secure devices. Therefore, we immediately make a reservation: <\/span><span style=\"font-weight: 400;\">it will not work to make a USB token from<\/span> <span style=\"font-weight: 400;\">a USB flash drive.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">File data on<\/span> <span style=\"font-weight: 400;\">a flash drive<\/span> <span style=\"font-weight: 400;\">can be added or changed, but<\/span> <span style=\"font-weight: 400;\">not on<\/span> <span style=\"font-weight: 400;\">a token.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The key located on the<\/span> <span style=\"font-weight: 400;\">token<\/span> <span style=\"font-weight: 400;\">never leaves the device, and data from<\/span> <span style=\"font-weight: 400;\">a flash<\/span> <span style=\"font-weight: 400;\">drive can be easily transferred to another medium.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The information on the<\/span> <span style=\"font-weight: 400;\">flash drive<\/span> <span style=\"font-weight: 400;\">can be read by almost anyone, but<\/span> <span style=\"font-weight: 400;\">not on the<\/span> <span style=\"font-weight: 400;\">token. It is encrypted.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The resource of a USB drive is usually limited. Whereas<\/span> <span style=\"font-weight: 400;\">USB tokens<\/span> <span style=\"font-weight: 400;\">from trusted manufacturers are designed for more secure and long-term storage of credentials.<\/span><\/li>\n<\/ul>\n<p><b>It is very important to choose a good quality token \u2013 this way you reduce the risks of unauthorized use of your data or signature. <\/b><\/p>\n<h2><b>How to choose a quality hardware key \u2013 security token<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">In order to select good quality devices, we recommend that you adhere to the following criteria:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>International certification.<\/b><span style=\"font-weight: 400;\"> You can, of course, try to use budget options from little-known manufacturers for home purposes. But in this case, there is no guarantee that vulnerabilities and malware were not embedded in the devices during production.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Support for common security protocols. <\/b><span style=\"font-weight: 400;\">This is important for the easy integration of the device into the services you choose. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>No moving parts, impact resistant housing. <\/b>Such devices will last for many years, and you can not worry about their frequent replacement.<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Today, Yubikey<\/span> <span style=\"font-weight: 400;\">USB tokens<\/span> <span style=\"font-weight: 400;\">meet all the above requirements.<\/span> <\/p>\n<p><span style=\"font-weight: 400;\">There is also<\/span> <b>a wide selection of these products<\/b><span style=\"font-weight: 400;\">:<\/span> <\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Among USB tokens, you can choose both budget options for home use, and<\/span> <span style=\"font-weight: 400;\">hardware tokens<\/span> <span style=\"font-weight: 400;\">with enhanced protection for employees of government agencies, banking institutions, IT corporations, etc.;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The list of devices includes series that support one-time OTP passwords or protocols for 2FA, there are tokens specifically designed to work with popular services from Microsoft, Google, Facebook, Twitter, etc.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The manufacturer was concerned about the possibility of using keys on any device, so he offered various form factors: there are keys with USB-A connectors for PCs, there are USB-C for mobile devices, and there are also Lightning tokens for iPhone. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">There are also nano-keys that fit into the USB connector and slightly protrude from the device body. This is very convenient, as they remain invisible and do not interfere with moving along with a laptop (if you like to travel, for example).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In addition, all Yubikey keys not only have a reliable impact-resistant housing made of composite material reinforced with fiberglass, but also enhanced protection against dust and moisture \u2013 IP68. If you suddenly drop the device into the pool or accidentally forget the <\/span><span style=\"font-weight: 400;\">USB token<\/span> <span style=\"font-weight: 400;\">in your pocket while sending your clothes to the laundry, nothing will happen to it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And given that Yubikey has become the choice of such major IT corporations as Google, Facebook and Binance, there is no doubt about the reliability and quality of products. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">When choosing keys, be guided primarily by the purposes for which you want to use them. To make your task easier, <\/span><b>we<\/b><span style=\"font-weight: 400;\">, as the official distributor of products in Ukraine,<\/span><b> we can provide, upon your request, information with a list of services that support certain series of devices. Contact us!<\/b><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_slider include_categories=&#8221;380&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/04\/090f3141-scaled.jpg&#8221; custom_margin=&#8221;||-85px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_post_slider][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is a USB token and how to use itThe concept of a USB token Since protecting accounts with a login and password has long been outdated, back in the early 2000s, many manufacturers began to offer USB tokens as an alternative solution. These are hardware keys for secure authorization and secure storage of personal [&hellip;]<\/p>\n","protected":false},"author":42,"featured_media":242579,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":" How is a USB token different from a flash drive?","_seopress_titles_desc":"How is a USB token different from a flash drive? Why can&#039;t it be replaced with a token? How to choose quality hardware devices","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[403,437],"tags":[],"class_list":["post-242576","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-articles-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/242576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=242576"}],"version-history":[{"count":2,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/242576\/revisions"}],"predecessor-version":[{"id":242578,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/242576\/revisions\/242578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media\/242579"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=242576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=242576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=242576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}