Technology 3 min read

Star Wars-Inspired Google Implements Use of Physical Security Keys

Physical security in the Star Wars universe involves more than just hiding a disk in a droid. While we can't use intranets for everyday life to eliminate risks, we can copy what one of the world's biggest tech companies (Google) does to safeguard its employees' information.

Google just took a leaf out of the Star Wars book by adopting new physical security methods. | Image By Bennian | Shutterstock

Google just took a leaf out of the Star Wars book by adopting new physical security methods. | Image By Bennian | Shutterstock

This article details recent news about tech giant Google maintained security using physical security keys.

We totally called it in our article about Star Wars and cryptography: location and physical security are the ways of cryptographic future.

News slipped last week that Google is using physical security keys to avoid phishing.

Given how often sites get hacked, from carphones to electrical grids to Equifax, adopting tech that could provide at least a modicum of more protection makes sense.

How can the physical security strategy help in our everyday lives?

Wikimedia

Why Google Adopted Physical Security Keys

Many people know that one of the key ways to “hack” people involves phishing. Here’s a quick refresher for those who need it:

  1. You receive a suspicious or semi-official looking email asking for information
  2. Both of these kinds of emails require you to give up sensitive information such as passwords, credit card information, etc.
  3. You get phished when you give up any sensitive information.

Naturally, Google wanted its employees to avoid this at all possible costs.

As early as 2017, Google instated a rule that all employees had to use two-factor authentication via a security key device. Krebs on Security reported that the ~85,000 employees must use regular passwords AND a plug-in device unique to them.

“We have had no reported or confirmed account takeovers since implementing security keys at Google. Users might be asked to authenticate using their security key for many different apps/reasons. It all depends on the sensitivity of the app and the risk of the user at that point in time.” – Google Spokesperson to Krebs on Security

Regular two-factor authentication is still susceptible to vulnerabilities, so Google took the next step. Universal 2nd Factor Authentication (U2F) is the next real wave in security.

An example of physical security in the Star Wars universe via StarWars.com

Location and Physical Security in an IoT Time

The biggest issue with security in the Star Wars universe, as we pointed out, is that it required remote locations and seemingly dated physical technology.

In order to prevent hacking (if that universe has it), bases such as the one on Scarif might have required intranets as opposed to traditional internets with significant vulnerabilities.

While Google’s adoption of physical security is good, having no possible connection risks is the ultimate way to protect your data. Unfortunately, not having internet in your everyday life is not terribly realistic.

Just like Google, you can adopt U2F technology thanks to companies like Yubico or Feitian. The Yubikey product happens to integrate seamlessly with Google Chrome, but you can set it up manually with Firefox, too.

For now, in our universe, physical security generally relates to key cards and the like. In time, U2F technology will become more ubiquitous and hackers may adapt as well.

How did Yubikey and similar tech work for you in the past?

Found this article interesting?

Let Juliet Childers know how much you appreciate this article by clicking the heart icon and by sharing this article on social media.


Profile Image

Juliet Childers

Content Specialist and EDGY OG with a (mostly) healthy obsession with video games. She covers Industry buzz including VR/AR, content marketing, cybersecurity, AI, and many more.

Comments (0)
Most Recent most recent
You
share Scroll to top

Link Copied Successfully

Sign in

Sign in to access your personalized homepage, follow authors and topics you love, and clap for stories that matter to you.

Sign in with Google Sign in with Facebook

By using our site you agree to our privacy policy.