

***iOS/iPadOS is only able to communicate with the YubiKey's OATH application (required for Yubico Authenticator functionality) via NFC and Lightning. ** iOS/iPadOS 13.3 and Safari are required to leverage native support for WebAuthn. In any case, we would advise you to try an adapter from a reliable, trust-worthy brand. *Please note that we do not recommend using adapters, but do understand that adapters are sometimes unavoidable. Note: Yubico Authenticator does not support this option** if you're not running iPadOS 16.1 and the latest version of the Yubico Authenticator***


I use 3: one that never leaves my office, one that never leaves my home, and one that I keep with me. I recommend a minimum of 2 one stays with you on your keychain while the other can remain at home or in your offi ce. Get a couple of keys and try to keep them in different places. Email, at least, needs to be absolutely secured, as an email compromise will allow a SIM swap which gets around SMS authentication. As an IT professional, I generally tell my clients that SMS 2FA gets you 90% of the way there TOTP (Time-based One Time Passcodes) gets you 99% of the way there and hardware keys are as close to 100% as you can get.

To the best of my knowledge, there is no way around a hardware key unless the user up and bypasses it themselves. There are now inexpensive "toolkits" that allow the bad guys to set up phishing attacks that get around all forms of 2FA.
