Skip to main content

Everykey is a master key for your phone, Gmail, and door lock

Alongside running for president in 2016 (and contributing articles to Digital Trends), John McAfee is now also launching a new crowdfunding project for Everykey on Indiegogo.

Originally announced in October 2014 on Kickstarter, Everykey lets you access your phone, tablet, Gmail account, car, and more just by having the device nearby. It uses low-energy Bluetooth to connect with an access-controlled device or service.

This new project is for a keyring accessory, smaller than the wristband launched on Kickstarter last year. It starts at $128 for one device, which is a notch up from the $50 the company charged for the wristband.

Everykey uses “military grade” encryption on the device to protect users’ data from hackers — that’s AES 128-bit encryption. Bluetooth signals are encrypted and pseudo-random, preventing hacker rebroadcasts of the same Bluetooth signal.

Users are able to sign into Google, Facebook, and Twitter accounts automatically when Everykey is nearby. It uses saved password functionality available on Chrome, Mozilla, and Safari, with Microsoft Edge support scheduled in the future.

The device is a rather unremarkable thing to look at, a small black slab with the words EK in white on the front. The battery will last 30 days and it is water resistant. It has a range of three meters, and the range can be customized to avoid unlocking a device in another room.

If the device is lost, users will be able to call Everykey or go online to freeze it. The company will send out another key at a discount, with all of the passwords stored on the new device.

For people with dozens of passwords and locks on a range of devices, Everykey might be the solution that offers convenience while preserving top-notch security. The folks at Everykey have launched an open SDK, allowing car manufacturers and smart home devices to connect to Everykey.

Editors' Recommendations

David Curry
Former Digital Trends Contributor
David has been writing about technology for several years, following the latest trends and covering the largest events. He is…
Your iPhone can now act as a physical Google security key
Google account security

A year after introducing it for Android phones, Google has today announced that iPhones can now function as physical two-factor security keys for logging into the company’s own services like Gmail in Chrome. This authentication method is a lot more secure than the two-factor prompt you’re likely used to, as it requires your iPhone to be physically in the computer’s proximity.

Two-factor authentication adds an extra layer of security to your accounts. However, SMS and internet-based two-factor processes have been in the past failed to prove as secure as one would hope for. Google’s solution for that takes advantage of your phone’s Bluetooth to turn it into a dedicated security key and ensures you’re physically authenticating the login.

Read more
The 6-in-1 Ultraloq U-Bolt Pro deadbolt lock opens with a shake of your phone
ultra u bolt pro smart lock 6 lifestyle code 2000x2000

Smart home locks are everywhere these days, but a new device called the Ultraloq U-Bolt Pro has a unique and promising hook -- it unlocks when you shake your smartphone in a specific way. We're not sure it's the vision of the future, but it cracks us up to think about people doing weird moves in front of their houses to unlock their doors.

Kidding aside, the lock itself is pretty cool. As always, there's an app: The U-tec app will unlock the door via any smartphone. Users can also create a temporary code and an Ekey for guests by using the app, which is very cool for anyone hosting people via apps like AirBNB, as homeowners can grant access to guests without actually being there.

Read more
Google says hackers have been able to access your iPhone data for years
google discovers two year old iphone security hole 5s dark

iPhones from iOS 10 to recent versions of iOS 12 were open to having messages, images, and location data stolen by hackers through a web-based exploit, according to Google's external security & research blog, Google Project Zero.

As part of a 30-month-long operation, researchers were able to take advantage of an exploit in Apple's default web browser, Safari, to load malware onto devices. Simply landing on an infected webpage was all that was needed to infect an iOS device, and once deployed, the malware allowed hackers to access sensitive data from across the device. According to the extensive blog post, the earliest version of iOS infected by this exploit was iOS 10.0.1, meaning the security hole was likely in existence from at least September 2016.

Read more