myIDkey: Voice-Activated Password Protection
A new 'Kickstarter' project is getting a whole lot of attention from PC security experts. That's because the device attached to the project 'myIDkey' is a USB stick that effectively protects a user's passwords by using cutting-edge security technologies.
Kickstarter is an online funding and investment service that allows everyday people to invest in ideas they like.
The company behind a product establishes an investment goal and if enough people contribute and that firm reaches its goal, it gets to use the cash towards developing the new product.
Those who invest get a share in the new company. (Source: kickstarter.com)
USB Drive Scans Computer for Relevant Data
In this case, the people behind myIDkey have set a $150,000 goal and so far have raised just over $100,000. Those who pledge $99 to the project get a free myIDkey and a pair of unique protective sleeves for the device.
So, what does myIDkey do?
After plugging the device into your computer's USB drive, myIDkey will search your computer for pertinent information and will then request you fill in a number of forms. (Source: cnet.com)
It's an incredibly fast tool that will establish a database of your most important logins, passwords, account numbers, and screen names in just a few minutes. The more passwords and account numbers you have, the more useful this product will be.
Fingerprint, Voice, Tap Security Measures Included
If you're worried about security, note that accessing myIDkey requires swiping a thumb or finger and saying a password into the attached microphone.
If that's not enough security for you, myIDkey will even allow users to establish a tap sequence to protect stored data. For example, tapping three times fast and four times slow could be used to unlock the device.
This device also supports voice searching, so you can sift through all of the stored information simply by saying a few words (for example: "Chase Savings"). (Source: slashgear.com)
Finally, if someone steals your myIDkey and repeatedly attempts and fails to access the stored data, the device will automatically wipe out that information.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.