SafeKey
  • Introduction To SafeKey
  • Getting Started
    • Choosing Your SafeKey(s)
      • Which SafeKey do I need?
      • How many SafeKeys do I need?
      • SafeKey Comparison
      • Orders & Shipment
    • First Time Using Your SafeKey
      • Best Practices
      • SafeKey as Security Key
      • SafeKey as Secure Storage Device for Encrypted Data
    • Glossary
  • Use Cases
    • Two-Factor Authentication
    • Passwordless Logins
    • Phishing Protection
    • Decentralized and Encrypted Backups
    • Digital Inheritance
  • Tools
    • SafeKey Desktop Tool
    • Inheriti®
    • SafeKey Mobile
      • Changelog
  • User Guides
    • SafeKey Settings
    • Firmware Update
    • SafeKey Authenticity Check
    • PIN Code Management
    • Registration Test
    • Login Test
    • Factory Reset
    • Backups
      • Create Backups
      • Restore Backups
      • Identical SafeKey Devices
  • Technicals
    • Metadata
    • Certificates
    • Hardware
    • Identification
    • Patents
    • Licensing
  • Developers
    • Introduction
    • PHP Software Libraries (FIDO2)
    • Javascript Libraries (CS)
    • Python CLI Tools (CS)
    • SafeKey Protocol (CS)
    • High-Level Design Docs (CS)
Powered by GitBook
On this page

Was this helpful?

  1. Use Cases

Phishing Protection

SafeKey offers built-in phishing protection to help protect against unauthorized access to your accounts. Phishing is a common method used by hackers to gain access to sensitive information, such as login credentials and passwords, by creating fake emails and websites that appear to be from legitimate companies or organizations.

To provide phishing protection, SafeKey includes a feature that checks the domain of the website being accessed to ensure it is legitimate. This makes it much more difficult for hackers to create fake websites that can be used to trick users into revealing their login information.

In addition to checking the domain of the website, SafeKey also requires the user to authenticate their identity with a physical action, such as inserting the key into the computer and touching it. This added step makes it much harder for hackers to gain access to your accounts, even if they have obtained your password.

SafeKey's built-in phishing protection helps to ensure the security and integrity of your accounts, making it a valuable tool for protecting against unauthorized access.

Last updated 2 years ago

Was this helpful?