YubiKey

Yubico AB
Company typeAktiebolag
NasdaqYUBICO
IndustryHardware
Founded2007 (2007)
Headquarters
Key people
Stina Ehrensvärd (Founder)
Jakob Ehrensvärd (CTO)
Mattias Danielsson (CEO)
Websiteyubico.com

The YubiKey is a collection of hardware authentication devices manufactured by Yubico AB (Nasdaq Stockholm: YUBICO), a company founded in 2007 by Jakob and Stina Ehrensvärd and headquartered in Stockholm, Sweden, with an American subdivision incorporated in Santa Clara California.[1][2]

As of March 2026, the YubiKey range includes a number of devices that support the FIDO2 authentication standard and come in various sizes and interface formats. The flagship YubiKey 5 Series also supports a number of other industry standards including OATH, PIV and OpenPGP, as well as a legacy proprietary "OTP" applet with various functions. Yubico also offers a hardware security module, the YubiHSM 2. The YubiKey 5 Series and YubiHSM 2 have FIPS 140-2–certified versions for government or enterprise clients subject to regulatory requirements.

YubiKeys can be used to authenticate access to websites, apps, operating systems, remote servers, networks and other environments, with some YubiKey products also supporting encryption/decryption (of files or messages) and digital signing. The name "YubiKey" derives from the phrase "your ubiquitous key" and "yubi", the Japanese word for finger, emphasising the YubiKey's versatility and the physical touch used to verify the user's presence.[3]

History

Yubico was founded in 2007 and began offering a Pilot Box for developers in November of that year.[4] The original YubiKey product was shown at the annual RSA Conference in April 2008,[5][6] and a more robust YubiKey 2.0 model was launched in 2009.[7][8] The YubiKey 2.0 added dual "slots", for storing two distinct configurations with separate AES secrets and other settings. When authenticating, the first slot is used by only briefly pressing the button on the device, while the second slot is used by holding the button for 2 to 5 seconds.

In 2010, Yubico began offering the YubiKey OATH and YubiKey RFID models. The YubiKey OATH added the ability to generate 6- and 8-character OATH passwords in addition to the 32-character passwords used by Yubico's own OTP scheme.[7] The YubiKey RFID model included the OATH capability plus also included a MIFARE Classic 1k radio-frequency identification chip,[9] though that was a separate device within the package that could not be configured with the normal Yubico software over a USB connection.[10]

Yubico announced the YubiKey Nano in February 2012, a miniaturized version of the standard YubiKey which was designed so it would fit almost entirely inside a USB port and only expose a small touch pad for the button.[11] Most later models of the YubiKey have also been available in both standard and "nano" sizes.

2012 also saw the introduction of the YubiKey Neo, which improved upon the previous YubiKey RFID product by integrating near-field communication (NFC).[12] The YubiKey Neo (and Neo-n, a "nano" version of the device) was able to transmit one-time passwords to NFC readers as part of a configurable URL contained in a NFC message. The Neo was also able to communicate using the CCID smart-card protocol in addition to USB HID (human interface device) keyboard emulation. The CCID mode is used for PIV smart card and OpenPGP support, while USB HID is used for the one-time password authentication schemes.[13]

In 2014, the YubiKey Neo was updated with FIDO Universal 2nd Factor (U2F) support.[14] Yubico, Google and NXP Semiconductors co-developed the FIDO U2F standard.[15] Later that year, Yubico released the "FIDO U2F Security Key", which specifically included U2F support but none of the other one-time password, static password, smart card, or NFC features of previous YubiKeys.[16] At launch, it was correspondingly sold at a lower price point of just $18, compared to $25 for the YubiKey Standard ($40 for the Nano version) and $50 for the YubiKey Neo ($60 for Neo-n).[17] Some of the pre-release devices issued by Google during FIDO/U2F development reported themselves as "Yubico WinUSB Gnubby (gnubby1)".[18]

In April 2015, the company launched the YubiKey Edge in both standard and nano form factors. This slotted in between the Neo and FIDO U2F products feature-wise, as it was designed to handle OTP and U2F authentication, but did not include smart card or NFC support.[19] The YubiKey 4 family of devices was first launched in November 2015, with USB-A models in both standard and nano sizes. The YubiKey 4 includes most features of the YubiKey Neo, including increasing the allowed OpenPGP key size to 4096 bits (vs. the previous 2048), but dropped the NFC capability of the Neo.

At CES 2017, Yubico announced an expansion of the YubiKey 4 series to support a new USB-C design. The YubiKey 4C was released on February 13, 2017.[20] On Android OS over the USB-C connection, only the one-time password feature is supported by the Android OS and YubiKey, with other features not currently supported including Universal 2nd Factor (U2F).[21] A 4C Nano version became available in September 2017.[22]

In April 2018, Yubico released a new product called the Security Key (this name had previously been used for the 2014 FIDO U2F Security Key); this was their first device to implement the new FIDO2 authentication protocols, WebAuthn (which reached W3C Candidate Recommendation status in March[23]) and Client to Authenticator Protocol (CTAP). The device was only available in the "standard" form factor with a USB-A connector. Like the previous FIDO U2F Security Key, it used a key icon on its button. At launch, it was blue in color like the previous FIDO U2F Security Key and distinguished by a number "2" etched into the plastic between the button and the keyring hole. It was also less expensive than the YubiKey Neo and YubiKey 4 models, costing $20 per unit at launch because it lacked the OTP and smart card features of those previous devices, though it retained FIDO U2F capability.[24]

From 2021 to 2023, Yubico progressively brought the Security Key Series aesthetically in line with the YubiKey 5 Series: in 2021, the button icon was changed from the key to the "y" logo for the launch of the Security Key C NFC in 2021 (a change also applied to the older Security Key NFC in May 2022), and in 2023, the color was changed from blue to black. The non-NFC versions were also retired, and the "NFC" part of the Security Key NFC name became less prominent.[25]

Products and features

YubiKey 5 Series

As of March 2026, the flagship[26] product is the YubiKey 5 Series, first released in 2018,[25] which comes in multiple sizes and interface formats (USB-A with NFC, USB-C with or without NFC, and USB-C + Lightning)[27] and can be used for a wide range of cryptographic tasks including authentication (for access to websites, apps, operating systems, remote servers, networks etc.), encryption/decryption and digital signing.[28] It achieves this by hosting multiple "applets" with memory slots/addresses on its secure, tamper-resistant hardware, with most applets being based on a widespread, cross-platform industry standard.[29] The applets and their protocols are understood by and can be interacted with using a wide variety of software, ranging from Yubico applications to third-party software, web browsers and operating systems, although some administrative tasks can only be performed by Yubico tools.[30]

The FIDO2 (sometimes referred to as FIDO2/WebAuthn,[31] WebAuthn being the browser/OS implementation standard) applet can store passkeys for passwordless authentication via the CTAP2 protocol or two-factor authentication (2FA) via the CTAP1 (formerly U2F) protocol.[32] The OATH applet can store seeds for time-based one-time passwords (TOTP) or HMAC-based one-time passwords (HOTP). The YubiKey 5 Series also has a PIV (a smart card standard) applet and an OpenPGP applet, which each have widespread applications from authentication to message and file encryption and signing. There is also a legacy proprietary applet named "OTP" with two slots, each of which can be programmed to store either a one-time password following a proprietary format ("Yubico OTP", which platforms verify using Yubico's "YubiCloud" servers[33]), a static password of the user's choosing, a random or user-chosen secret for HMAC challenge–response or an OATH HOTP. This applet causes the YubiKey to function as a USB HID (similar to a keyboard) to enter the "OTP" slot contents on short press (slot 1) or long press (slot 2) of the YubiKey's touch sensor (unless challenge–response is used in the given slot). This USB HID functionality does not apply to the other applets.[30] A "Yubico OTP" is factory-programmed into slot 1 of the YubiKey 5; the user can regenerate it or overwrite the slot for a different use, but any user-generated Yubico OTPs will have a different prefix ("vv" instead of "cc").[34]

Other products

The product lineup as of March 2026 also includes the YubiKey Security Key Series, a cheaper, "streamlined"[26] offering that only contains the FIDO2 applet and does not have a nano or non-NFC version.[35] Yubico also offers an "Enterprise Edition" of the Security Key Series, available on the "Yubikey as a Service" subscription plan; these feature a serial number to enable asset tracking.[36]

The YubiKey Bio Series is another offering that supports biometric authentication through its fingerprint sensor. This series does not have a nano or NFC version.[35] The standard YubiKey Bio Series (known as the "FIDO Edition"[37]) only supports FIDO2, but in 2024, Yubico announced a "Multi-protocol Edition" that also supports PIV, available to enterprise clients on the YubiEnterprise Subscription.[38][39]

Yubico offers a FIPS 140-2–certified version of the YubiKey 5 Series for government and enterprise clients subject to regulation requiring stringent certification.[35] In November 2024, Yubico announced that the YubiKey 5 FIPS Series was undergoing certification according to the new FIPS 140-3 standard.[40] Yubico had previously offered CSPN-certified versions of the for European markets (CSPN is an ANSSI certification), but these were discontinued in 2024 due to limited demand.[41]

Yubico also offers the YubiHSM 2, a hardware security module for generating and storing master cryptographic keys for servers. The YubiHSM 2 also has a FIPS 140-2–certified version.[42]

Comparison table

A list of the primary features and capabilities of the YubiKey products.[25][43][44][45][46]

Model Years sold Secure
static
passwords
OTP standards Smart cards FIDO standards HSM FIPS 140-2 variant CSPN variant Interface
OATH
OTP
Yubico
OTP
OATH: HOTP
(event)
OATH: TOTP
(time)
PIV OpenPGP U2F FIDO2 NFC USB-A USB-C Lightning
YubiKey VIP 2011–2017 Yes Yes
YubiKey Nano 2012–2016 Yes Yes Yes Yes
YubiKey NEO 2012–2018 Yes Yes Yes Yes Yes Yes Yes Yes Yes
FIDO U2F Security Key 2013–2018 Yes Yes
YubiKey Plus 2014⁠–⁠2015 Yes Yes Yes
YubiKey NEO-n 2014–2016 Yes Yes Yes Yes Yes Yes Yes Yes
YubiKey Standard 2014–2016 Yes Yes Yes Yes
YubiKey Edge-n 2015–2016 Yes Yes Yes Yes Yes Yes Yes
YubiKey 4 Nano 2016–2017 Yes Yes Yes Yes Yes Yes Discontinued (2018–2021) Yes
YubiHSM 1 2015–2017 Yes Yes
YubiKey 4 2015–2018 Yes Yes Yes Yes Yes Yes Yes Discontinued (2018–2021) Yes
YubiKey 4 Nano 2015–2018 Yes Yes Yes Yes Yes Yes Yes Discontinued (2018–2021) Yes
YubiKey 4C 2017–2018 Yes Yes Yes Yes Yes Yes Yes Discontinued (2018–2021) Yes
YubiKey 4C Nano 2017–2018 Yes Yes Yes Yes Yes Yes Yes Discontinued (2018–2021) Yes
YubiHSM 2 2017– Yes Available (2021–) Yes
YubiKey 5A 2018–2023 Yes Yes Yes Yes Yes Yes Yes Yes
YubiKey 5C Nano 2018– Yes Yes Yes Yes Yes Yes Yes Yes Available (2021–) Discontinued (2021–2024) Yes
YubiKey 5C 2018– Yes Yes Yes Yes Yes Yes Yes Yes Available (2021–) Discontinued (2021–2024) Yes
YubiKey 5 Nano 2018– Yes Yes Yes Yes Yes Yes Yes Yes Available (2021–) Discontinued (2021–2024) Yes
YubiKey 5 NFC 2018– Yes Yes Yes Yes Yes Yes Yes Yes Available (2021–) Discontinued (2021–2024) Yes Yes
Security Key by Yubico (blue) 2018–2020 Yes Yes Yes
YubiKey 5Ci 2019– Yes Yes Yes Yes Yes Yes Yes Yes Available (2021–) Discontinued (2021–2024) Yes Yes
Security Key NFC by Yubico (blue) 2019–2023 Yes Yes Yes Yes
YubiKey 5C NFC 2020– Yes Yes Yes Yes Yes Yes Yes Yes Available (2021–) Discontinued (2021–2024) Yes Yes
Security Key C NFC by Yubico (blue) 2021–2023 Yes Yes Yes Yes
YubiKey Bio – FIDO Edition 2021– Yes Yes Yes
YubiKey C Bio – FIDO Edition 2021– Yes Yes Yes
Security Key NFC by Yubico 2023– Yes Yes Yes Yes
Security Key C NFC by Yubico 2023– Yes Yes Yes Yes
Security Key NFC – Enterprise Edition 2023– Yes Yes Yes Yes
Security Key C NFC – Enterprise Edition 2023– Yes Yes Yes Yes
YubiKey Bio – Multi-protocol Edition 2024– Yes Yes Yes Yes
YubiKey C Bio – Multi-protocol Edition 2024– Yes Yes Yes Yes

Modhex

When being used for one-time passwords and stored static passwords, the YubiKey emits characters using a modified hexadecimal alphabet which is intended to be as independent of system keyboard settings as possible. This alphabet, invented by Yubico,[30] is referred to as Modhex (sometimes written "ModHex"[47] or "modhex"[48]) and consists of the characters "cbdefghijklnrtuv", corresponding to the hexadecimal digits "0123456789abcdef".[49]

Since YubiKeys use raw keyboard scan codes in USB HID mode, there can be problems when using the devices on computers that are set up with different keyboard layouts, such as Dvorak. Modhex was created to avoid conflicts between different keyboard layouts. It only uses characters that are located in the same place on most Latin alphabet keyboards, but is still 16 characters, allowing it to be used in place of hexadecimal.[47] Alternatively, this issue can be addressed by using operating system features to temporarily switch to a standard US keyboard layout (or similar) when using one-time passwords. However, YubiKey Neo and later devices can be configured with alternate scan codes to match layouts that aren't compatible with the Modhex character set.[50]

This problem only applies to YubiKey products in HID mode, where it must emulate keyboard input. U2F authentication in YubiKey products bypasses this problem by using the alternate U2FHID protocol, which sends and receives raw binary messages instead of keyboard scan codes.[51] CCID mode acts as a smart card reader, which does not use HID protocols at all.

Security issues

YubiKey 4 closed-sourcing concerns

Most of the code that runs on a YubiKey is closed-source. While Yubico has released some code for industry standard functionality like OpenPGP and HOTP, it was disclosed that as of the 4th generation of the product this is not the same code that the new units ship with.[52][53] Because new units are permanently firmware-locked at the factory, it is not possible to compile the open-source code and load it on the device manually; a user must trust that the code on a new key is authentic and secure.

Code for other functionality such as U2F, PIV and Modhex is entirely closed source.

On May 16, 2016, Yubico CTO Jakob Ehrensvärd responded to the open-source community's concerns with a blog post saying that "we, as a product company, have taken a clear stand against implementations based on off-the-shelf components and further believe that something like a commercial-grade AVR or ARM controller is unfit to be used in a security product."[54]

Techdirt founder Mike Masnick strongly criticized this decision, saying "Encryption is tricky. There are almost always vulnerabilities and bugs -- a point we've been making a lot lately. But the best way to fix those tends to be getting as many knowledgeable eyes on the code as possible. And that's not possible when it's closed source."[55]

ROCA vulnerability in certain YubiKey 4, 4C, and 4 Nano devices

In October 2017, security researchers found a vulnerability (known as ROCA) in the implementation of RSA keypair generation in a cryptographic library used by a large number of Infineon security chips, as used in a wide range of security keys and security token products (including YubiKey). The vulnerability allows an attacker to reconstruct the private key by using the public key.[56][57] All YubiKey 4, YubiKey 4C, and YubiKey 4 Nano devices within the revisions 4.2.6 to 4.3.4 were affected by this vulnerability.[58] Yubico remedied this issue in all shipping YubiKey 4 devices by switching to a different key generation function and offered free replacements for any affected keys until March 31, 2019. In some cases, the issue could be bypassed by generating new keys outside of the YubiKey and importing them onto the device.[59]

OTP password protection on YubiKey NEO

In January 2018, Yubico disclosed a moderate vulnerability where password protection for the OTP functionality on the YubiKey NEO could be bypassed under certain conditions. The issue was corrected as of firmware version 3.5.0, and Yubico offered free replacement keys to any user claiming to be affected until April 1, 2019.[60]

Reduced initial randomness on certain FIPS series devices

In June 2019, Yubico released a security advisory reporting reduced randomness in FIPS-certified devices with firmware version 4.4.2 and 4.4.4 (there is no version 4.4.3), shortly after power-up.[61] Security keys with reduced randomness may leave keys more easily discovered and compromised than expected. The issue affected the FIPS series only, and then only certain scenarios, although FIPS ECDSA usage was "at higher risk". The company offered free replacements for any affected keys.

Infineon ECDSA private key recovery

In September 2024, security researchers from NinjaLab discovered a cryptographic flaw in Infineon chips that would allow a person to clone a YubiKey if an attacker gained physical access to it. The security vulnerability permanently affects all YubiKeys prior to firmware update 5.7. Yubico rated the issue as "moderate", citing the need for an attacker to have physical access to the key, expensive equipment, and advanced cryptographic and technical knowledge.[62][63][64]

Social activism

In 2018, Yubico gave away free YubiKeys with laser-engraved logos to new WIRED and Ars Technica subscribers.[65]

Yubico provided 500 YubiKeys to protesters during the 2019–2020 Hong Kong protests. The company stated that the decision was based on their mission to protect vulnerable Internet users and work with free speech supporters.[66][67]

See also

References

  1. ^ Tan, Aaron (31 October 2025). "Yubico bolsters APAC presence, touts device subscriptions". Computer Weekly. Archived from the original on 12 November 2025.
  2. ^ "Yubico AB (YUBCF): Company Profile". Yahoo Finance. Retrieved 15 January 2026.
  3. ^ "Company Information". Yubico. Archived from the original on 25 November 2020. Retrieved 30 November 2020.
  4. ^ "Yubico launches YubiKey Pilot Box". Yubico. 26 November 2007. Archived from the original on 21 February 2008. Retrieved 6 May 2018.
  5. ^ Steve Gibson (April 2008). "Security Now! Notes for Episode #141". Security Now!. Gibson Research Corporation. Retrieved 5 May 2018.
  6. ^ Leo Laporte and Steve Gibson (24 April 2008). "Episode #141 - RSA Conference 2008". Security Now!. Gibson Research Corporation. Retrieved 5 May 2018.
  7. ^ a b "News 2009 - Yubico". www.yubico.com. Archived from the original on 4 November 2010. Retrieved 10 March 2026.
  8. ^ Mike (27 August 2009). "Yubikey II – got it". Read My Damn Blog. Retrieved 5 May 2018.
  9. ^ "RFID YubiKey". Yubico Store. Archived from the original on 29 August 2011. Retrieved 5 May 2018.
  10. ^ "RFID YubiKey". IDivine Technology. Archived from the original on 6 May 2018. Retrieved 5 May 2018.
  11. ^ "Yubico Launches YubiKey Nano, The World's Smallest One-Time Password Token" (Press release). Yubico. 28 February 2012. Retrieved 5 May 2018.
  12. ^ Clark, Sarah (22 February 2012). "Yubico introduces one-time password token that secures access to the contents of NFC phones". NFC World. Retrieved 5 May 2018.
  13. ^ Maples, David (26 December 2012). "YubiKey NEO Composite Device". Yubico. Retrieved 5 May 2018.
  14. ^ "Yubico Introduces Industry's First FIDO Ready™ Universal 2nd Factor Device". Yubico (Press release). 6 January 2014. Retrieved 5 May 2018.
  15. ^ "Universal 2nd Factor (U2F): History, Evolution, Advantages | Okta". www.okta.com. Retrieved 10 March 2026.
  16. ^ "Yubico Releases FIDO U2F Security Key". Yubico (Press release). 21 October 2014. Retrieved 5 May 2018.
  17. ^ "YubiKey Hardware". Yubico. Archived from the original on 7 November 2014.
  18. ^ "pamu2fcfg doesn't support test devices". GitHub.
  19. ^ "Yubico Launches YubiKey Edge at RSA 2015; OTP and U2F Two-Factor Authentication in One Key". Yubico (Press release). Retrieved 5 May 2018.
  20. ^ "NEW YubiKey 4C featuring USB-C revealed at CES 2017 | Yubico". Yubico. 5 January 2017. Retrieved 14 September 2017.
  21. ^ "Can the YubiKey 4C be plugged directly into Android phones or tablets with USB-C ports? | Yubico". Yubico. Archived from the original on 14 September 2017. Retrieved 14 September 2017.
  22. ^ "Our Family is Growing! YubiKey 4C Nano Unveiled at Microsoft Ignite". Yubico. 25 September 2017. Retrieved 5 May 2018.
  23. ^ Jones, Michael (20 March 2018). "Candidate Recommendation (CR) for Web Authentication Specification". W3C Web Authentication Working Group. Retrieved 6 May 2018.
  24. ^ "Yubico Launches New Developer Program and Security Key for FIDO2 and WebAuthn W3C Specifications" (Press release). 10 April 2018. Retrieved 6 May 2018.
  25. ^ a b c "What YubiKey Do You Have". Retrieved 11 February 2021.
  26. ^ a b "Get YubiKey UK". Yubico. Retrieved 9 March 2026.
  27. ^ "Yubico YubiKey 5C Nano". PCMag UK. 1 October 2025. Retrieved 9 March 2026.
  28. ^ "How the YubiKey works". Yubico. Retrieved 9 March 2026.
  29. ^ "Security tips on using YubiKey and FIDO U2F". Cossack Labs. 22 December 2023. Retrieved 9 March 2026.
  30. ^ a b c "Protocols and Applications — YubiKey Technical Manual documentation". docs.yubico.com. Retrieved 9 March 2026.
  31. ^ Writer, Staff. "Yubico launches first multi-protocol security keys supporting FIDO2". Retrieved 9 March 2026.
  32. ^ "CTAP". developers.yubico.com. Retrieved 9 March 2026.
  33. ^ "OTP". developers.yubico.com. Retrieved 10 March 2026.
  34. ^ "Yubico Support Guest Portal". support.yubico.com. Retrieved 10 March 2026.
  35. ^ a b c "Products". Yubico. Retrieved 9 March 2026.
  36. ^ "Security Key NFC - Enterprise Edition". support.yubico.com. Retrieved 10 March 2026.
  37. ^ "YubiKey Bio Series". Yubico. Retrieved 9 March 2026.
  38. ^ Team, Yubico (4 March 2024). "Introducing the expanded YubiKey Bio Series: YubiKey Bio Multi-protocol Edition (Early Access)". Yubico. Retrieved 10 March 2026.
  39. ^ Team, Yubico (8 November 2024). "Available now: YubiKey Bio Series - Multi-protocol Edition keys expand phishing-resistant authentication options for enterprises". Yubico. Retrieved 9 March 2026.
  40. ^ Wallace, Jeff (11 November 2024). "Yubico submits YubiKey 5 FIPS Series for FIPS 140-3 validation". Yubico. Retrieved 9 March 2026.
  41. ^ "Farewell to the YubiKey 5 CSPN series: What you need to know". yubikey-shop.at. Retrieved 10 March 2026.
  42. ^ Aref, Yazan; Alfughi, Zakiya; Ouda, Abdelkader (July 2025). "Evaluating Hardware Security Modules: Key Factors for Choosing the Best Option for Organizational Security Requirements". 2025 International Conference on Smart Applications, Communications and Networking. IEEE: 1–9. doi:10.1109/SmartNets65254.2025.11106800. ISBN 979-8-3315-1196-8.
  43. ^ "Identifying your YubiKey". Yubico. Archived from the original on 30 April 2022. Retrieved 10 March 2026.
  44. ^ "What YubiKey Do You Have? | Yubico". Yubico. Archived from the original on 5 October 2020. Retrieved 10 March 2026.
  45. ^ "Identifying Your YubiKey | Yubico". Yubico. Archived from the original on 21 September 2019. Retrieved 10 March 2026.
  46. ^ "End-of-Sale / End-of-Life Products". Yubico. Retrieved 10 March 2026.
  47. ^ a b "Modified hexadecimal encoding (ModHex)". docs.yubico.com. Retrieved 1 September 2023.
  48. ^ "Modhex Converter". developers.yubico.com. Retrieved 10 March 2026.
  49. ^ E, Jakob (12 June 2008). "Modhex - why and what is it?". Yubico. Archived from the original on 16 November 2017. Retrieved 6 November 2016.
  50. ^ Toh, Alvin (24 July 2013). "Expanding YubiKey Keyboard Support". Yubico. Retrieved 5 May 2018.
  51. ^ "FIDO U2F HID Protocol Specification". FIDO Alliance. 11 April 2017. Retrieved 6 May 2018.
  52. ^ Beaupré, Antoine (17 October 2017). "A comparison of cryptographic keycards". LWN.net. Retrieved 21 September 2020.
  53. ^ "Bad News: Two-Factor Authentication Pioneer YubiKey Drops Open Source PGP For Proprietary Version". techdirt. 16 May 2016. Retrieved 21 September 2020.
  54. ^ "Secure Hardware vs. Open Source". Yubico.com. 16 May 2016. Retrieved 18 September 2022.
  55. ^ Masnick, Mike (16 May 2016). "Bad News: Two-Factor Authentication Pioneer YubiKey Drops Open Source PGP For Proprietary Version". Techdirt. Retrieved 27 March 2020.
  56. ^ "ROCA: Vulnerable RSA generation (CVE-2017-15361) [CRoCS wiki]". crocs.fi.muni.cz. Retrieved 19 October 2017.
  57. ^ "NVD - CVE-2017-15361". nvd.nist.gov. Retrieved 19 October 2017.
  58. ^ "Infineon RSA Key Generation Issue - Customer Portal". Yubico.com. Retrieved 11 June 2019.
  59. ^ "Yubico Mitigation Recommendations". Yubico.com. Archived from the original on 21 November 2018. Retrieved 11 June 2019.
  60. ^ "Security Advisory YSA-2018-01 – Security Issue with Password Protection in Oath Applet on Yubikey NEO" (Press release). Yubico. 16 January 2018. Archived from the original on 1 October 2020.
  61. ^ "Security Advisory YSA-2019-02 – Reduced Initial Randomness on FIPS Keys" (Press release). Yubico. 13 June 2019. Archived from the original on 14 June 2019.
  62. ^ Roche, Thomas. (2024-09-03) "EUCLEAK: Side Channel Attack on the YubiKey 5 Series." (PDF) White Paper. Montpellier, France: NinjaLab. Archived from the original on 2024-09-03.
  63. ^ "Security Advisory YSA-2024-03 Infineon ECDSA Private Key Recovery" (Press release). Yubico. 3 September 2024. Archived from the original on 3 September 2024.
  64. ^ Goodin, Dan (3 September 2024). "Hackers Can Clone Yubikeys by Exploiting Side Channel that Leaks Their Private Key". Ars Technica. Archived from the original on 3 September 2024.
  65. ^ Manning, Ronnie (1 February 2018). "WIRED and Ars Technica Experts Choose YubiKey 4 for New Subscribers". Yubico. Retrieved 1 September 2023.
  66. ^ "Swedish tech firm Yubico hands Hong Kong protesters free security keys amid fears over police tactics online". South China Morning Post. 10 October 2019. Retrieved 18 October 2019.
  67. ^ "Yubico 贊助香港抗爭者世上最強網上保安鎖匙 Yubikey | 立場新聞". 立場新聞 Stand News (in Chinese). Retrieved 18 October 2019.