Technology 3 min read

Star Wars-Inspired Google Implements Use of Physical Security Keys

Google just took a leaf out of the Star Wars book by adopting new physical security methods. | Image By Bennian | Shutterstock

Google just took a leaf out of the Star Wars book by adopting new physical security methods. | Image By Bennian | Shutterstock

This article details recent news about tech giant Google maintained security using physical security keys.

We totally called it in our article about Star Wars and cryptography: location and physical security are the ways of cryptographic future.

News slipped last week that Google is using physical security keys to avoid phishing.

Given how often sites get hacked, from carphones to electrical grids to Equifax, adopting tech that could provide at least a modicum of more protection makes sense.

How can the physical security strategy help in our everyday lives?

Why Google Adopted Physical Security Keys

Many people know that one of the key ways to “hack” people involves phishing. Here’s a quick refresher for those who need it:

  1. You receive a suspicious or semi-official looking email asking for information
  2. Both of these kinds of emails require you to give up sensitive information such as passwords, credit card information, etc.
  3. You get phished when you give up any sensitive information.

Naturally, Google wanted its employees to avoid this at all possible costs.

As early as 2017, Google instated a rule that all employees had to use two-factor authentication via a security key device. Krebs on Security reported that the ~85,000 employees must use regular passwords AND a plug-in device unique to them.

“We have had no reported or confirmed account takeovers since implementing security keys at Google. Users might be asked to authenticate using their security key for many different apps/reasons. It all depends on the sensitivity of the app and the risk of the user at that point in time.” – Google Spokesperson to Krebs on Security

Regular two-factor authentication is still susceptible to vulnerabilities, so Google took the next step. Universal 2nd Factor Authentication (U2F) is the next real wave in security.

Location and Physical Security in an IoT Time

The biggest issue with security in the Star Wars universe, as we pointed out, is that it required remote locations and seemingly dated physical technology.

In order to prevent hacking (if that universe has it), bases such as the one on Scarif might have required intranets as opposed to traditional internets with significant vulnerabilities.

While Google’s adoption of physical security is good, having no possible connection risks is the ultimate way to protect your data. Unfortunately, not having internet in your everyday life is not terribly realistic.

Just like Google, you can adopt U2F technology thanks to companies like Yubico or Feitian. The Yubikey product happens to integrate seamlessly with Google Chrome, but you can set it up manually with Firefox, too.

For now, in our universe, physical security generally relates to key cards and the like. In time, U2F technology will become more ubiquitous and hackers may adapt as well.

How did Yubikey and similar tech work for you in the past?

First AI Web Content Optimization Platform Just for Writers

Found this article interesting?

Let Juliet Childers know how much you appreciate this article by clicking the heart icon and by sharing this article on social media.


Profile Image

Juliet Childers

Content Specialist and EDGY OG with a (mostly) healthy obsession with video games. She covers Industry buzz including VR/AR, content marketing, cybersecurity, AI, and many more.

Comments (2)
Least Recent least recent
You
  1. Profile Image
    George Lucas June 10 at 11:11 pm GMT

    How To Find Your Lost Cryptocurrency.
    My name is George Lucas. I want to testify about GEO COORDINATES HACKER. They helped me recover my stolen crypto worth $370,000 through their hacking skills. I tried it. I was skeptical but it worked and I got my money back, I’m so glad I came across them early because I thought I was never going to get my money back from those fake online investments. I want to recommend this great hacker to anyone that truly needs an urgent solution. You can also contact them via  
    Email; geovcoordinateshacker@proton.me
    Email; geovcoordinateshacker@gmail.com Telegram ( @Geocoordinateshacker )Website; https://geovcoordinateshac.wixsite.com/geo-coordinates-hack

  2. Profile Image
    Linda Anthony November 14 at 4:00 pm GMT

    GET RICH WITH BLANK ATM CARD, Whatsapp: +18033921735

    I want to testify about Dark Web blank atm cards which can withdraw money from any atm machines around the world. I was very poor before and have no job. I saw so many testimony about how Dark Web Online Hackers send them the atm blank card and use it to collect money in any atm machine and become rich I email them also and they sent me the blank atm card. I have use it to get 500,000 dollars. withdraw the maximum of 5,000 USD daily. Dark Web is giving out the card just to help the poor. Hack and take money directly from any atm machine vault with the use of atm programmed card which runs in automatic mode.

    You can also contact them for the service below

    * Western Union/MoneyGram Transfer

    * Bank Transfer

    * PayPal / Skrill Transfer

    * Crypto Mining

    * CashApp Transfer

    * Recover Stolen/Missing Crypto/Funds/Assets

    Email:>darkwebonlinehackers@gmail.com

    Telegram or WhatsApp: +18033921735

share Scroll to top

Link Copied Successfully

Sign in

Sign in to access your personalized homepage, follow authors and topics you love, and clap for stories that matter to you.

Sign in with Google Sign in with Facebook

By using our site you agree to our privacy policy.