The Internet of Trust

Over the last year, news headlines of compromised passwords and system vulnerabilities have continued to dent our trust in our Internet-connected computers, smart phones, networks, Certificate Authorities and software providers. A month ago, when the Heartbleed vulnerability was identified, some people claimed that this was the end of the great human experience called the Internet.

But great inventions don’t die just because security mistakes have been made. We trust seatbelts in cars and with new trust models we can build an even more powerful and secure Internet.

It begins with accepting that the static username and password for identification and authentication is not enough. And that networks, software and devices will never be free from hackers, backdoors and malware. Then we can then move our trust and login credentials to a small key, which we carry in our key-chain, and which is not connected to the Internet. Instead of trying to rely on vulnerable infrastructure, we set up a direct and secure link between the key and the application we want to connect to. And let the key change our user credentials every time we login.

In parallel, we are creating a new user centric trust model. Instead of relying on a single party for authentication to multiple services, we’re turning the model upside-down, where multiple services can rely on a single device. This concept of true end-point authentication is also the core idea behind FIDO Universal 2nd Factor, the open authentication standard that Yubico is spearheading.

Once you can purchase your secure online identity online or at your local store, and free and open source U2F libraries are published for any service to easily implement, the Internet will be a safer place. New, distributed, disruptive and lower cost trust models will evolve, empowered by billions of users.

Talk to our teamTalk to our team

Share this article:


  • The rise of AI-driven phishing attacks: What to know and how to be secureAs businesses continue learning the benefits that artificial intelligence (AI) assisted computing tools provide, we’re continuing to see rapid interest and adoption of the technology – especially within the enterprise. Most conversations up until recently have revolved around ChatGPT, but now another new AI-powered large language model tool – DeepSeek – is creating a lot […]Read more
  • Works with YubiKey Spotlight: Expanded partnerships redefining phishing-resistance in 20252024 was an exciting year for Yubico and our partners. Together, we achieved remarkable milestones, launching innovative solutions and forging stronger partnerships – all aimed at delivering the most impactful cybersecurity solutions and user experience for our customers and partners. At the heart of these efforts lies a shared commitment to phishing-resistance.  From registration to […]Read moreWorks with YubiKeywwyk
  • Cybersecurity in 2025 – part two: Insights and predictions from Yubico’s expertsIn part one of our 2025 cybersecurity predictions, we highlighted insights from our experts on the topic of passkeys, digital identity wallets and the threats of AI-driven phishing – areas that saw a lot of focus in 2024, and ones that we expect to continue being a major focus this year. If you missed our […]Read morecritical infrastructurefederal governmentfinancial servicespredictions
  • surface blog crownMicrosofts Surface Pro 10 möjliggör NFC-baserad lösenordsfri inloggning med YubiKeys, för företagDra fördel av det långvariga samarbetet mellan Microsoft och Yubico genom att distribuera YubiKeys tillsammans med den nya Surface Pro 10 enheten för ditt företag. Read morenfcpasswordless