OnlyKey DUO is the newest addition, supporting all of your devices with either USB-A or USB-C, it supports both in one portable key.

OnlyKey supports touch to type passwords or touch to login as a security key (FIDO2): 

With industry leading features OnlyKey DUO provides protection from phishing attacks and keeps your digital world safe.

    • Hardware-based password manager. It stores and types strong passwords for you. With so many websites and so many log ins, remembering passwords can be impossible. It works with Windows, Mac OS, Linux, Chromebook, iOS, and Android, just press a button to login with secure passwords!
    • Hardware-based TOTP. It stores and types OTPs for you. You can use OnlyKey to automatically type your 6-digit TOTP codes instead of an authenticator app.
    • Secure firmware upgrades. Receives regular updates and new features.
    • OpenPGP and secure encrypted backup. Never worry about losing OnlyKey DUO
    • Developer tools. GnuPG support. Sign emails, git commits, software packages, or manage your passwords (gpg-agent with pass and gopass). Protects SSH keys. Authentication, web tunnels, file transfers and more (OpenSSH and SSH-Agent).

No need to install any software to immediately use as a security key to login to major websites such as Microsoft, Google, Facebook, Dropbox, GitHub, Okta, AWS and more

Durable, waterproof, and tamper-resistant design allows you to take your OnlyKey DUO with you everywhere.


OnlyKey DUO - Open Source Yubikey alternative with dual USB-C and USB-A | Product Hunt

Latest Stories

Tout afficher

Securing the Future: Comparing YubiKey and OnlyKey in the Evolving Multifactor Authentication Landscape

Securing the Future: Comparing YubiKey and OnlyKey in the Evolving Multifactor Authentication Landscape

As cybersecurity threats continue to evolve, multifactor authentication (MFA) has become a critical safeguard for protecting sensitive data. YubiKey security keys are among the most widely adopted tools for MFA, enhancing security by requiring a physical device for user authentication....

Plus

Defragmenting Enterprise Authentication | An Improved Approach to Identity Access Management

Defragmenting Enterprise Authentication | An Improved Approach to Identity Access Management

In the ever-evolving landscape of cybersecurity, Chief Information Security Officers (CISOs) face a persistent challenge: securing authentication mechanisms within their organizations. Despite numerous predictions heralding the end of passwords, they remain a cornerstone of digital security. This article delves into...

Plus

The Fragility of Centralized Services: A Case for Decentralized Solutions

The Fragility of Centralized Services: A Case for Decentralized Solutions

Centralized services, while convenient, come with significant vulnerabilities. They require users to trust third parties with their data, creating potential single points of failure. When these systems falter, the repercussions can be widespread and severe. For example, CrowdStrike, a prominent...

Plus