Online security is always a risky business – especially in account breaches (which we have gone through before). In this article though,we take a look at Everykey vs. Nymi, two systems that are challenging the current security structure.
You might wake up one morning to an account breach or stealing of your credentials, and it raises the question of how safe your account is. When going through a situation like this, it forces you to question the security levels of your accounts, and it is easy to understand why due to the inherent weakness of passwords.
Because of the numerous challenges that are present in authentication systems online (In passwords, 2FA and U2F), companies are now coming up with new ways of authenticating you when you access your account. Therefore, the use of Biometric data is shaping up to be a huge thing, but how does it compare to Bluetooth-influenced security?
What are the differences between Everykey and Nymi? How do they compare?
|Security system used||Bluetooth, military grade security||Biometrics (specifically ECG, or electrocardiogram)|
|Compatibility||Any RSA and AES compliant site||Any FIDO, as well as AES and RSA compliant site|
|Power source||Rechargeable battery||Rechargeable battery|
|Click here||Click here|
Everykey vs. Nymi – what are the differences?
The mode of authentication
TheEverykey password manageris like a key finder and 2FA key combined in one, as it uses Bluetooth to act as a replacement of your passwords and keys in general. Through the use of Military-grade security, you can unlock and lock your access controlled devices and online accounts.
On the other hand, the premise of Nymi wristband comes from the inherent problems that are within the current security systems, and using these weaknesses to forge a solution of its own – using ECG as a form of authentication. You simply wear it on your wrist, and any compatible websites use your heartbeat to prove it is you, therefore letting you in when you access your account.
Through biometric measures, Nymi completely eliminates the relevancy of passwords or extra authentication measures, part of the measure of ‘who you are’ to weed out any unauthorized individuals.
The Everykey increases your security through the generation of random passwords, as long as the site adheres to RSA and AES encryption standards. You can then use them to log you into sites automatically, and this is why it acts similar to a 2FA system. In addition, you can also freeze the system when you happen to lose it, so that you eliminate the worry of someone else taking over your accounts.
The Nymi is similar to this in terms of access, but has its difference when you wear the band.You can also use it in multiple platforms, such as Android, Windows and OSX.
Locking and unlocking
In the Everykey, you can lock your connected devices remotely through the Bluetooth system. When it senses you have walked or moved away from the device, it locks the device automatically and unlocks it when you come near. However, the Nymi is similar to many U2F keys, as you are the only person authorized to access your account (only through a biometric method), rather than the typical password system that risks hacking (unless you use a two-factor authentication system).
The first time you log in to a website, the key will remember the login and save your password. You will not need to authenticate yourself afterwards, at least in theory, and it will always log you in.While this sounds good, it does have its own security risks, such as when another person uses the device and the password manager unlocks automatically.
The security of your account is increased through the generation of random passwords by the key, and all of these are secure. You can then use them to log you into sites automatically, and this is why it acts similar to a 2FA system.
- The combination of 2FA and U2F elements has high security potential
- Locks accounts and devices automatically when you leave
- Has many security loopholes that can be exposed by other people
The annoying process of typing in passwords or trying to change them is likely to be eliminated in relevance, thanks to the wireless taps of the band.In addition, you can easily integrate it with third-party applications, including HMI and SSO, allowing you to access other protocols securely and safely.
The good news is that it remains easy to wear and ensure the security of your accounts, as the electronic records it stores are impossible to duplicate.
- Charge lasts for many days (a full week)
- Compatible with numerous platforms
- High guaranteed security
- None noted so far
According to our Everykey vs. Nymi review, while the Everykey might prove to be good in certain respects, it has a problem of creating many security loopholes. TheNymi, on the other hand, ensures that only you are allowed to access your account, and no one can breach it without your permission.For that reason, the Nymi comes out as the winner.
Is it safe to trust biometric authentication?
While it is great to secure your account in as many ways as possible, there are genuine concerns about the validity of the method in actual practice. However, it is not a bad thing to consider trusting, especially when hacking has become more sophisticated with the improvement of technology.
Why is using a security key important?
The key will basically work as a second factor authentication, and some keys will allow you to retain your passwords as well.
What if it gets stolen?
The person who steals the key cannot access your account unless they know your password, which the key does not have (it only stores digital certificates, which do not have login information).
If you already have biometric information in the system, can you still use your password and username?
Yes, you still can. Depending on the individual service, you can be allowed to continue using your password as a backup.
What are some of the advantages of biometric authentication over Bluetooth or passwords?
Theseinclude being an easy and quick identification method, as well as your fingerprints or heartbeat rate being impossible to copy. However, these advantages will only work if you use them properly, or when they are implemented well.