The Internet of Trust

June 5, 2014 2 minute read

Over the last year, news headlines of compromised passwords and system vulnerabilities have continued to dent our trust in our Internet-connected computers, smart phones, networks, Certificate Authorities and software providers. A month ago, when the Heartbleed vulnerability was identified, some people claimed that this was the end of the great human experience called the Internet.

But great inventions don’t die just because security mistakes have been made. We trust seatbelts in cars and with new trust models we can build an even more powerful and secure Internet.

It begins with accepting that the static username and password for identification and authentication is not enough. And that networks, software and devices will never be free from hackers, backdoors and malware. Then we can then move our trust and login credentials to a small key, which we carry in our key-chain, and which is not connected to the Internet. Instead of trying to rely on vulnerable infrastructure, we set up a direct and secure link between the key and the application we want to connect to. And let the key change our user credentials every time we login.

In parallel, we are creating a new user centric trust model. Instead of relying on a single party for authentication to multiple services, we’re turning the model upside-down, where multiple services can rely on a single device. This concept of true end-point authentication is also the core idea behind FIDO Universal 2nd Factor, the open authentication standard that Yubico is spearheading.

Once you can purchase your secure online identity online or at your local store, and free and open source U2F libraries are published for any service to easily implement, the Internet will be a safer place. New, distributed, disruptive and lower cost trust models will evolve, empowered by billions of users.

Share this article:

Recommended content

Quick Take: Executive Order on Improving the Nation’s Cybersecurity

With the recent number of attacks that have had a significant impact on critical systems, a new executive order on improving the nation’s cybersecurity has been released, covering many key areas that need to be addressed to protect critical digital infrastructure. This is one of the most detailed U.S. executive orders on cybersecurity and we ...

GitHub now supports SSH security keys

Today, GitHub has announced support for using U2F and FIDO2 security keys for SSH, and we’re honored to have been an early collaborator in working with GitHub on developing this feature. This makes it easier than ever to use YubiKeys to secure all your GitHub access, making your SSH keys much more secure while maintaining ...

Is your organization ready to go passwordless? Here is a list of questions to check your readiness and avoid the potholes later

We’ve said it before, but it bears repeating: the road to passwordless is a journey, not an overnight transition. At first, it begins with a basic understanding of what passwordless authentication is (and isn’t), but then it becomes time to take action and head further down the road. Still, the question for every enterprise IT ...

The YubiKey 5 FIPS Series is here and there are 5 things you need to know

Today, we’re thrilled to announce yet another product milestone in addition to the launch of YubiHSM 2 FIPS — the long-awaited YubiKey 5 FIPS Series is now generally available. It is the industry’s first set of multi-protocol security keys with support for FIDO2 and WebAuthn, along with smart card (PIV/CAC), to receive FIPS 140-2 validation, Overall ...