“How durable is it?”

This is one of the most common questions I get about OnlyKey. While we have the answer to this question in our FAQ that’s just not quite as gratifying as watching an OnlyKey set on fire and run over by a car. TPIDG recently tested OnlyKey doing just that, check out the review to see how OnlyKey did.

Speaking of questions about OnlyKey durability here are some less frequent ones that I have received and the answers just in case you were wondering.

Q — Will OnlyKey withstand an electromagnetic pulse (EMP) attack?

A — Due to OnlyKey’s simple design and small size it would probably fair better than other electronics like smartphones and computers. In the event of an EMP your OnlyKey may still work but be sure to make a backup if you are expecting an EMP in your area.

Q — Can I wear OnlyKey around my neck for diving and will it withstand salt water?

A — Yes, while we have not tested this specifically there have been reports of OnlyKey being used like this. Rinsing off the salt water with clean water is recommended.

Q — I accidentally ran my OnlyKey through the washing machine will it be OK?

A — OnlyKey is highly water resistant, just make sure to fully dry it off before plugging into a computer.

Originally published at CryptoTrust.


OnlyKey Durability Review was originally published in onlykey on Medium, where people are continuing the conversation by highlighting and responding to this story.


Read the original article

Latest Stories

View all

Securing the Future: Comparing YubiKey and OnlyKey in the Evolving Multifactor Authentication Landscape

Securing the Future: Comparing YubiKey and OnlyKey in the Evolving Multifactor Authentication Landscape

As cybersecurity threats continue to evolve, multifactor authentication (MFA) has become a critical safeguard for protecting sensitive data. YubiKey security keys are among the most widely adopted tools for MFA, enhancing security by requiring a physical device for user authentication....

Read more

Defragmenting Enterprise Authentication | An Improved Approach to Identity Access Management

Defragmenting Enterprise Authentication | An Improved Approach to Identity Access Management

In the ever-evolving landscape of cybersecurity, Chief Information Security Officers (CISOs) face a persistent challenge: securing authentication mechanisms within their organizations. Despite numerous predictions heralding the end of passwords, they remain a cornerstone of digital security. This article delves into...

Read more

The Fragility of Centralized Services: A Case for Decentralized Solutions

The Fragility of Centralized Services: A Case for Decentralized Solutions

Centralized services, while convenient, come with significant vulnerabilities. They require users to trust third parties with their data, creating potential single points of failure. When these systems falter, the repercussions can be widespread and severe. For example, CrowdStrike, a prominent...

Read more