Can Two-Factor Protect Democracy?

Millions of people use YubiKeys all across the globe, and our customers often share how they use YubiKeys at work and for their personal accounts. Now and then we hear a unique story from a new perspective that catches our attention. Sometimes these stories prove the value of what we are working on, in this case: protecting democracy.

Today’s youth is growing up online, always connected, and used to having their personal identities sync directly with their online personas. We are happy to see that even at the youngest of ages, the importance of two-factor authentication (2FA) is making its way into their lives.

We received the story below from a customer who was proud to tell us that his son, Matt, recently won first place at his school’s science fair. His project, “So you think you can Phish?” is the first we have heard of including YubiKeys in a high school science fair!

science fair phishing project
Matt’s Winning Science Fair Project

In his project, Matt identifies the importance of 2FA, specifically the use of YubiKey and the FIDO Universal 2nd Factor (U2F) authentication standard, and illustrates how this simple added step could have prevented a recent, highly publicized phishing attack.

In Matt’s conclusion, he states that even though John Podesta fell for a phishing attack, the former chairman of the 2016 Hillary Clinton presidential campaign could have protected his email account against unauthorized access had he enabled 2FA with a YubiKey. Ultimately, Podesta could have eliminated any potential for leaked emails. Which leaves many people wondering, could this have affected the recent election? Could this have protected democracy? Some say yes, some say no, but what it makes clear is that usernames and passwords simply are not enough.

Spreading the value of 2FA cannot be understated, and students like Matt are helping to not only inform their peers but their educators as well. We wish Matt the best of luck at regionals and potentially nationals!

We love to hear new stories and uses from our customers. Please email us at press@yubico.com if you have any that you would like to share.

Talk to our teamTalk to our team

Share this article:


  • Works with YubiKey Spotlight: Expanded partnerships redefining phishing-resistance in 20252024 was an exciting year for Yubico and our partners. Together, we achieved remarkable milestones, launching innovative solutions and forging stronger partnerships – all aimed at delivering the most impactful cybersecurity solutions and user experience for our customers and partners. At the heart of these efforts lies a shared commitment to phishing-resistance.  From registration to […]Read moreWorks with YubiKeywwyk
  • Cybersecurity in 2025 – part two: Insights and predictions from Yubico’s expertsIn part one of our 2025 cybersecurity predictions, we highlighted insights from our experts on the topic of passkeys, digital identity wallets and the threats of AI-driven phishing – areas that saw a lot of focus in 2024, and ones that we expect to continue being a major focus this year. If you missed our […]Read morecritical infrastructurefederal governmentfinancial servicespredictions
  • Cybersecurity in 2025: Insights and predictions from Yubico’s expertsWith 2024 behind us, we saw another challenging year in the world of cybersecurity – highlighted by new and evolving threats like Artificial Intelligence (AI)-driven phishing and increasingly sophisticated cyber attacks overall. Yubico’s September Global State of Authentication Survey confirmed the challenges, even underscoring the potential risks of these new threats. The report emphasized the […]Read moreAIdigital identity walletspasskeyspredictions
  • State of Global Authentic(age)ion: A look at cybersecurity habits by generationsNo generations were left untouched when it came to the threat of hackers in 2024: from the impact of political shakeups, to increasingly sophisticated cyber attacks targeting consumers, critical industries and infrastructures, the world was on high alert. Fueled by a dramatic increase in phishing attacks circumventing certain forms of legacy multi-factor authentication (MFA), as […]Read moreState of Global Authenticationsurvey