Proton

Protect your Proton Account with YubiKey and other security keys

Поделиться этой страницей

You keep important moments of your life in your Proton Account. Whether it’s bank statements you receive in Proton Mail, photos you store in Proton Drive, or events you set up in Proton Calendar, your data deserves to be protected. 

Today, we’re happy to introduce the simplest and most secure way of keeping your account safe: security keys, also known as hardware keys or two-factor authentication keys (2FA keys). You can now sign in to your Proton Account on the web using a hardware key, such as a YubiKey, as long as it adheres to the U2F or FIDO2 standard.

Set up a security key 

What are security keys

Have you ever signed in to an online account and been asked to verify your identity with a six-digit code sent to your mobile device? That’s two-factor authentication (2FA). Enabling 2FA is critical to securing your Proton Account — with 2FA, even if an attacker gets a hold of your password, they cannot sign in to your account without access to your mobile device.

Security keys are another form of 2FA. They help you prove your identity when you’re logging in to an account, app, or device. If you choose to use a 2FA key, you’ll be asked to plug in your key every time you sign in to your Proton Account.

Why you should use a security key

At Proton, we support 2FA using time-sensitive verification codes (TOTP) generated by an authenticator app installed on your mobile device. We use TOTP as it is more secure than 2FA using text messages, which are vulnerable to SIM-swapping attacks.

However, using TOTP can be inconvenient as it involves entering a code in a short period of time. Having a hardware key removes this hassle. Hardware keys are also a “possession factor”, which proves you physically own the key used to authenticate your account. Due to their physical nature, hardware keys are one of the most secure forms of 2FA. 

They are also convenient and easy to use — all you need to do is to plug your key into your computer when asked to verify your identity. Depending on your device, you may even use its built-in security key to verify your identity with biometrics such as Apple’s Touch ID or Windows Hello.

Learn how to set up a security key with your Proton Account

As we continue to expand our private-by-default ecosystem, we’ll be adding support for security keys across all Proton platforms, including our desktop and mobile apps. 

Thank you for your support, and we look forward to introducing even more privacy-first features in the upcoming months.

Обеспечьте конфиденциальность своих данных с Proton
Создать бесплатный аккаунт

Поделиться этой страницей

Lydia Pang

Lydia is a lifelong book-lover and her professional experience spans several industries, including higher education and editorial writing. She's excited to write for Proton and champion privacy as a fundamental right for everyone.

Статьи по теме

proton scribe
en
Most of us send emails every day. Finding the right words and tone, however, can take up a lot of time. Today we’re introducing Proton Scribe, a smart, privacy-first writing assistant built right into Proton Mail that helps you compose and improve yo
en
People and companies are generally subject to the laws of the country and city where they are located, and those laws can change when they move to a new place. However, the situation becomes more complicated when considering data, which can be subjec
en
  • Советы о конфиденциальности
Your online data is no longer just used for ads but also for training AI. Google uses publicly available information to train its AI models, raising concerns over whether AI is even compatible with data protection laws. People are worried companies
en
  • Советы о конфиденциальности
iPhone stores passwords in iCloud Keychain, Apple’s built-in password manager. It’s convenient but has some drawbacks. A major issue is that it doesn’t work well with other platforms, making it hard for Apple users to use their passwords and passkeys
en
There are many reasons you may need to share passwords, bank details, and other highly sensitive information. But we noticed that many people do this via messaging apps or other methods that put your data at risk. In response to the needs of our com
en
  • Новости о конфиденциальности
Large language models (LLMs) trained on public datasets can serve a wide range of purposes, from composing blog posts to programming. However, their true potential lies in contextualization, achieved by either fine-tuning the model or enriching its p