

We preferred security keys that came with a variety of connection options so they could work on both Android and iOS, as well as both Windows and macOS computers.


Future-proof support for multiple standards: We focused on keys supporting the newest set of specifications, such as FIDO2.Security protocols: Since hardware keys are a security item, we dug into each company’s track record on previous recalls and looked at whether the company had a coordinated vulnerability-disclosure program to allow security researchers to report bugs.
