Which SafeKey do I need?

Choosing the right SafeKey model depends on what you want to use it for.

There are two different SafeKey models: SafeKey One and SafeKey Pro.

SafeKey One

The main use cases for the SafeKey One are:

It also has automated phishing protection included.

The purpose of using the SafeKey One is to protect your online accounts against phishing attacks or hacks. If your account is secured with a SafeKey and someone happens to get access to your password, then they still won't get access to your account because they don't have access to your SafeKey.

SafeKey One acts as a physical extra security layer to your authentication processes.

SafeKey Pro

SafeKey Pro is the only device that’s compatible with inheriti.com.

SafeKey Pro does everything the SafeKey One does, so it can be used to protect your online accounts against phishing attacks or hacks.

But, additionally the SafeKey Pro has also been designed with custom internal storage. This allows you to store shares of encrypted backups and inheritance plans created via inheriti.com.

The SafeKey Pro does not only protect your accounts, it also helps you to protect and backup your secret and sensitive data.

Think about data such as:

  • Usernames and passwords

  • Email accounts

  • Social media accounts

  • Private keys and seed phrases to access your crypto and NFTs

  • Data from all your devices: computers, smartphones, …

  • All data stored on your hard drives or in your cloud

  • Domain names

  • Bank accounts

  • Investments

  • Family receipts

  • Confidential business information

  • Your biggest secrets

Weaknesses Of Regular Two-Factor Authentication Apps.

While 2FA is very simple to use, some methods are inherently insecure and exposed to hacks. The most popular implementation, Time-based One-Time Password (TOTP), popularized by its use on Google Auth and crypto exchanges like Binance, transmits the shared secret (master key) over the internet during the setup process.

This weakness has been recognized by major players who created FIDO Alliance and defined new, more secure standards such as Universal 2nd Factor Authentication (U2F), which introduces the use of a hardware device for user authentication, such as the SafeKey.

Some other weaknesses of regular 2FA are:

  • You have to manually input the code at logging in, adding another step to the process.

  • Backup codes are sent online, which is often insecure.

  • You and the provider share the same secret. If a hacker gets into a company and gains access to both the password and the secrets database, he will be able to access every account completely unnoticed.

  • The secret is displayed in plaintext or QR code. It cannot be provided as a hash or with a cryptographic salt. This also means that the secret is most likely stored in plaintext form, on the servers of the provider.

  • The secret can be exposed during the registration, as the provider has to give you a generated secret. By using TOTP, you have to trust the providers to be able to protect the secret.

SafeKey gets you better two-factor authentication and goes one step further than traditional methods by using the Universal 2nd Factor standard (U2F).

What does that mean?

Well, not only do you need your regular login credentials such as your email address, username and password, it is also necessary to have a physical device as a means of authentication: your SafeKey.

Adding a hardware device to the authentication process gives your account a massive security boost and should easily keep hackers out of your way.


Because it is impossible that someone who happens to get your password can log in to your account, because logging in also requires your SafeKey.

Last updated