Note: When Yubikey NEO is the premium model with NFC. The NFC feature only provides more security along with an (Android) smartphone with NFC support meaning. It is also advisable to check in advance whether your model works with the key as it apparently may be incompatibilities with NFC definitely! -------------------------------------------------- ---------------- When Yubikey is a clever piece of hardware, you can hedge with the logins by so-called two-factor authentication (2FA). The idea is that you can prove his identity on the one hand by something you know (your password) and the other by something that you have (the Yubikey). An identity thief must therefore have both if they want to log in successfully. Particularly useful is the Yubikey in conjunction with a password safe like LastPass. So you can not support for the countless websites that 2FA, use complex passwords that you do not have to remember, because they only retrieves from the password safe, if necessary. At the same time, these passwords are secured by the Yubikey and password for a safe. On PCs or laptops simply plug the Yubikey into an available USB port. By a brief tap on the button you create an 'accidental' one-time password (OTP), which thanks to encryption technology from third can not be guessed, at the same time proves, however, that you are in possession of the 'right' Yubikey. A Yubikey has two 'slots' can be utilized in different ways. Preconfigured is the generation of a 'Random Keys' after brief contact described above. The second slot can be used for an extended contact. So you can for example be generated a static password. In addition to OTP standard, which is supported for example by LastPass, there is the FIDO U2F standard, which is used among other things by Google. Previously you had to decide whether you want to use OTP or U2F, now you have to know is that the NEO supports both, simultaneously.
The NFC feature the NEO has two main applications: You can use two-factor authentication with the LastPass app and use a vendor-supplied Yubico app to 'classic' one-time passwords that are compatible with the Google Authenticator, using the YubiKeys generate. The 'Secrets', the basis of which the codes are generated are so on the Yubikey stored within a secure than Android App as the authenticator, can be protected by an additional password and retrieve any Android device that supports NFC.
Who does not require NFC, has a choice of three other, similar Keys:
Yubikey Edge: Without NFC, with U2F, OTP and static password 'Classical' Yubikey: Only OTP and static password FIDO U2F Security Key: Only U2F
As you can see, the Edge is the best choice if you NFC not needed because it is more flexible than the other keys. The many complicated technical details can therefore be safely aside and concentrating animals on the question of whether the current smart phone does not support NFC or and depending on the Edge or buy the NEO. The use itself is very straightforward, since everything has already Yubico preconfigured important. One thus obtains a significant increase in security and must be the technical details do not care if you do not want. This deserves five stars.