YubiKey is the dominant brand of hardware security key — a small USB or USB-C device that authenticates you via FIDO2 / WebAuthn protocols. The YubiKey 5 NFC ($55 on yubico.com US store) is the standard model; the 5C NFC ($55) adds USB-C support. Tap it on a phone or insert into a laptop USB port, touch the metal contact, and the device produces a cryptographic signature that proves you're you to the website. Phishing-resistant by protocol design.

Why YubiKey beats SMS, TOTP, and passwords

Three properties that compound:

The cryptographic secret never leaves the device. The YubiKey's secure element generates and stores private keys; the host computer never sees them. Even malware running with administrator privileges on your laptop cannot exfiltrate the YubiKey secrets.

Domain binding. The YubiKey's signature is bound to the domain that issued the credential. A phishing site at "coinbase-support.com" cannot ask the YubiKey to authenticate against "coinbase.com" — the browser refuses because the domains don't match. This is the property that defeats phishing-relay attacks against TOTP.

Physical possession requirement. To use the key, you have to touch it. Remote attackers cannot trigger authentication without physical presence at the device. Combined with the user being the only person who holds it, this raises the attack cost dramatically.

What a US-resident crypto holder uses YubiKey for

Three primary use cases:

Exchange account 2FA at Coinbase, Kraken, Gemini, Binance.US. Each exchange supports YubiKey as a second factor via their security settings. The setup is one-time: insert key, register, the exchange remembers the credential. For subsequent logins, password + YubiKey touch = authenticated.

Email account 2FA at Gmail, Outlook, ProtonMail. Email is the recovery channel for almost every exchange and wallet. Compromising email leads to compromising downstream accounts. YubiKey on email is one of the highest-leverage security upgrades available.

GitHub authentication, Apple ID, Microsoft Account. For US holders with development or business operations on top of crypto, these accounts merit YubiKey protection for the same reasons.

The two-key principle

Always buy two YubiKeys: one primary, one backup. Register both on every account that supports YubiKey. Store the backup in a fireproof safe or bank deposit box. Total cost: $110 plus a few hours of registration time.

The failure mode that "one YubiKey" creates: lose or break the single key, lose access to every account it secures. Recovery via the exchange's alternate path takes days, sometimes weeks, and is precisely the social-engineering window an attacker would exploit. Two keys, registered everywhere, addresses this completely.

YubiKey vs Passkey

Two reasonable defaults in 2026:

Passkey for everyday accounts. Banking, email, social media, low-stakes exchange accounts. The phone you already carry is the Passkey storage; the iCloud or Google sync model handles backup.

YubiKey for high-value accounts. Exchange accounts holding meaningful balances, the email that controls exchange recovery, GitHub if you maintain infrastructure. The discrete hardware key adds protection against iCloud or Google account compromise — a class of attack that Passkey alone cannot defend against.

For a US-resident holder past the mid-six-figure mark, the standard layout: Passkey on the phone for daily use, YubiKey 5C NFC × 2 registered on the exchange accounts and primary email, primary YubiKey on the keychain, backup YubiKey in a bank safe-deposit box.

What YubiKey is not

YubiKey is not a hardware wallet. It does not store crypto private keys or sign blockchain transactions (well, the firmware has some experimental crypto-signing features, but they're not the primary use). The YubiKey secures your exchange and email accounts; the hardware wallet secures your crypto keys. These are two separate devices doing two separate jobs.

Further reading: Passkey, 2FA, The 2FA truth.