SafeKey
  • Introduction To SafeKey
  • Getting Started
    • Choosing Your SafeKey(s)
      • Which SafeKey do I need?
      • How many SafeKeys do I need?
      • SafeKey Comparison
      • Orders & Shipment
    • First Time Using Your SafeKey
      • Best Practices
      • SafeKey as Security Key
      • SafeKey as Secure Storage Device for Encrypted Data
    • Glossary
  • Use Cases
    • Two-Factor Authentication
    • Passwordless Logins
    • Phishing Protection
    • Decentralized and Encrypted Backups
    • Digital Inheritance
  • Tools
    • SafeKey Desktop Tool
    • Inheriti®
    • SafeKey Mobile
      • Changelog
  • User Guides
    • SafeKey Settings
    • Firmware Update
    • SafeKey Authenticity Check
    • PIN Code Management
    • Registration Test
    • Login Test
    • Factory Reset
    • Backups
      • Create Backups
      • Restore Backups
      • Identical SafeKey Devices
  • Technicals
    • Metadata
    • Certificates
    • Hardware
    • Identification
    • Patents
    • Licensing
  • Developers
    • Introduction
    • PHP Software Libraries (FIDO2)
    • Javascript Libraries (CS)
    • Python CLI Tools (CS)
    • SafeKey Protocol (CS)
    • High-Level Design Docs (CS)
Powered by GitBook
On this page
  • SafeKey One
  • SafeKey Pro
  • SafeKey Mobile (app)
  • SafeKey Mobile download links

Was this helpful?

  1. Getting Started
  2. Choosing Your SafeKey(s)

Which SafeKey do I need?

Choosing the right SafeKey model depends on what you want to use it for.

Last updated 8 months ago

Was this helpful?

There are three SafeKey options: SafeKey One, SafeKey Pro and the SafeKey Mobile app.

SafeKey One

The main use cases for the SafeKey One are:

The purpose of using the SafeKey One is to protect your online accounts against phishing attacks or hacks. If your account is secured with a SafeKey and someone happens to get access to your password, then they still won't get access to your account because they don't have access to your SafeKey.

SafeKey One acts as a physical extra security layer to your authentication processes.

SafeKey Pro

SafeKey Pro does everything the SafeKey One does, so it can be used to protect your online accounts against phishing attacks or hacks.

The SafeKey Pro does not only protect your accounts, it also helps you to protect and backup your secret and sensitive data.

Think about data such as:

  • Usernames and passwords

  • Email accounts

  • Social media accounts

  • Private keys and seed phrases to access your crypto and NFTs

  • Data from all your devices: computers, smartphones, …

  • All data stored on your hard drives or in your cloud

  • Domain names

  • Bank accounts

  • Investments

  • Family receipts

  • Confidential business information

  • Your biggest secrets

  • …

SafeKey Mobile (app)

SafeKey Mobile is the mobile alternative to the internal storage of SafeKey Pro.

It enables users to store encrypted shares of their protection plans directly on their smartphones, offering a more versatile, on-the-go solution without compromising security.

SafeKey Mobile is integrated with SafeID, allowing seamless management of your Inheriti® plan shares. It offers secure mobile storage for encrypted plan shares, ensuring they are easily accessible yet protected.

Use SafeKey Mobile if you:

  • Need immediate access to your encrypted plan shares on your phone.

  • Prefer a mobile-based solution rather than a physical hardware key.

  • Want an added layer of encryption and convenience for managing shares on-the-go.

SafeKey Mobile download links

Note: SafeKey Mobile does not provide 2FA or passwordless login capabilities. It is focused on the secure storage of Inheriti® plan shares. If you're looking for a combination of 2FA and storing your plan shares, use a SafeKey Pro.

Weaknesses Of Regular Two-Factor Authentication Apps.

While 2FA is very simple to use, some methods are inherently insecure and exposed to hacks. The most popular implementation, Time-based One-Time Password (TOTP), popularized by its use on Google Auth and crypto exchanges like Binance, transmits the shared secret (master key) over the internet during the setup process.

This weakness has been recognized by major players who created FIDO Alliance and defined new, more secure standards such as Universal 2nd Factor Authentication (U2F), which introduces the use of a hardware device for user authentication, such as the SafeKey.

Some other weaknesses of regular 2FA are:

  • You have to manually input the code at logging in, adding another step to the process.

  • Backup codes are sent online, which is often insecure.

  • You and the provider share the same secret. If a hacker gets into a company and gains access to both the password and the secrets database, he will be able to access every account completely unnoticed.

  • The secret is displayed in plaintext or QR code. It cannot be provided as a hash or with a cryptographic salt. This also means that the secret is most likely stored in plaintext form, on the servers of the provider.

  • The secret can be exposed during the registration, as the provider has to give you a generated secret. By using TOTP, you have to trust the providers to be able to protect the secret.

SafeKey gets you better two-factor authentication and goes one step further than traditional methods by using the Universal 2nd Factor standard (U2F).

What does that mean?

Well, not only do you need your regular login credentials such as your email address, username and password, it is also necessary to have a physical device as a means of authentication: your SafeKey.

Adding a hardware device to the authentication process gives your account a massive security boost and should easily keep hackers out of your way.

Why?

Because it is impossible that someone who happens to get your password can log in to your account, because logging in also requires your SafeKey.

It also has automated included.

SafeKey Pro is the only hardware device that’s compatible with .

But, additionally the SafeKey Pro has also been designed with custom internal storage. This allows you to store shares of and created via .

Stronger two-factor authentication (2FA)
Passwordless logins
phishing protection
inheriti.com
encrypted backups
inheritance plans
inheriti.com
Download in the Apple App Store for iOS
Download in the Google Play Store for Android