How Google’s Physical Keys Will Protect Your Password

Minh Uong/The New York Times
Minh Uong/The New York Times
TT

How Google’s Physical Keys Will Protect Your Password

Minh Uong/The New York Times
Minh Uong/The New York Times

Why won’t the password just go away? The silly pet names, movie titles or sports teams that many people punch in to get into their online accounts are a weak spot that hackers continue to puncture.

Yet passwords remain the primary way we log in to online accounts containing our personal and financial information. Google has a new pragmatic solution: Embrace the password, but lock it down with extra physical security.

The company this month released its Advanced Protection Program, which is meant to make stealing your password pointless. To use it, you’ll need two inexpensive physical keys to log in to your Google account on your computer and smartphone.

This way, even if hackers stole your password in a data breach or successfully phished for it, by tempting you to hand over your credentials on a fake login page, they couldn’t do anything unless they got their hands on the keys as well. And minimizing risk with minimal effort is a boon to anyone who cares about online security.

“I am a big fan of this,” said John Sabin, a former hacker for the National Security Agency. “It’s probably the easiest and most secure multifactor for the masses.”

The physical keys are an evolution of two-factor authentication, an extra security layer to ensure that your password is being entered by you. Google was one of the first companies to start offering two-factor authentication back in 2010, not long after it learned that it had been hacked by state-sponsored Chinese hackers.

After the attack, Google’s security team came up with a motto: “Never again.” The company later rolled out two-factor authentication for Google customers’ Gmail accounts. It involved text messaging a unique code to your phone that you must type in after entering your password in order to log in.

Unfortunately, those text messages can be hijacked. Last month, security researchers at Positive Technologies, a security firm, demonstrated how they could use vulnerabilities in the cellular network to intercept text messages for a set period of time.

The idea of Google’s Advanced Protection Program is to provide people with a physical device that is much harder to steal than a text message. Google is marketing the program as a tool for a tiny set of people who are at high risk of online attacks, like victims of stalking, dissidents inside authoritarian countries or journalists who need to protect their sources.

But why should extra-tough security benefit such a small group? Everyone should be able to enjoy stronger security.

So we tested Google’s Advanced Protection Program and vetted it with security researchers to see if the program could be used by the masses. The verdict: Many people should consider signing up for the security system and buying a pair of keys. But if you are married to some non-Google apps that are not yet compatible with the keys, you should wait and see if the program matures.

Setting Up Advanced Protection

Anyone with a Google account can sign up for the security program on Google’s Advanced Protection webpage. To get started, you will have to buy two physical keys for about $20 each. Google recommends buying one from Feitian and another from Yubico.

The keys, which look like thumb drives and can fit on your key chain, contain digital signatures that prove you are you. To set one up, you plug the key into a computer USB port, tap a button and name it. (The Feitian key wirelessly communicates with your smartphone to authenticate the login.) This process takes a few minutes.

On a computer and a smartphone, you need to log in with the key only once, and Google will remember the devices for future logins. That is more convenient than traditional two-factor authentication, which requires entering a unique code each time you log in.

But there are trade-offs. Google’s Advanced Protection cuts off all third-party access by default, allowing only applications that support its security keys. For the time being, that means only Google’s Gmail mail app, Google’s Backup and Sync app, and Google’s Chrome browser.

On an iPhone, for example, you will have to use Google’s Gmail or Inbox apps for email, and on a computer, you can use only the Chrome browser when signing in with a browser. So if you rely on Apple Mail to gain access to your Gmail on an iPhone, or if you use Microsoft Outlook for getting into Gmail on a PC, you’re out of luck. Google says its goal is to eventually allow third-party apps to work with the program, but it is also up to other companies to update their apps to support the keys.

Testing the Security

Despite the drawbacks, security researchers agree that the Advanced Protection Program is a solid piece of security and relatively painless to use, even for everyday use for people outside high-security jobs.

Mr. Sabin, the former N.S.A. hacker, who is now a director of network security at GRA Quantum, a security consulting firm, said the physical keys had pros and cons. On one hand, if you lose a key, a hacker would have a hard time figuring out which account it was associated with.

On the other hand, if you lose the keys or don’t have the keys around when you need to log in to a new device, it takes longer to regain access to your account. Google has put in place more elaborate recovery steps for Advanced Protection users, including additional reviews and requests for details about why users have lost access to their account. In our test, we answered security questions to try to recover an account, and Google said it would review the recovery request and respond within a few days.

Runa Sandvik, the director of information security at The New York Times, said the keys were not much of a hassle. She said Google’s requirement of using two keys meant you essentially had a spare: If you lose one key, you can get into your account with the remaining key.

But she noted that the keys could get annoying if you used many devices and constantly needed to carry the keys around to log in to your account. That may be an issue for people who work in the technology industry, but most people probably use only one computer and one phone.

Ms. Sandvik, who has been testing Google’s program to assess whether to recommend it to the newsroom, said she had not yet discovered vulnerabilities in the security key system outside of the slim possibility that a hacker gained possession of both your password and your key.

“It’s something that is relatively easy to set up once you have both keys,” Ms. Sandvik said. “I don’t see a reason you shouldn’t turn this on.”

The Bottom Line

While the security keys are easy to set up and provide tough security, they may be disruptive to your productivity if you rely on apps that are incompatible with the keys.

It took a few minutes for us to migrate to Google’s apps from Apple’s and integrate them into our newsroom workflow, which already relies on Google’s mail, messaging and cloud storage services. But using the keys required sacrificing an important feature — Apple’s V.I.P. alerts, which notify you when people you deem important email you. Google’s iOS apps for Gmail and Inbox lack a similar feature. For people with flooded inboxes, lacking V.I.P. alerts makes sifting through emails time-consuming.

Another example of how the keys can stifle productivity: Many employers still require using the Microsoft Outlook app for email, which won’t work with the keys.

If using Google’s security program would disrupt your work, you may want to wait for more companies to update their apps to support the keys, which rely on a standard called FIDO, for Fast Identity Online. Mr. Sabin predicts that many apps will follow Google’s lead.

If you decide to wait, don’t procrastinate on turning on traditional two-factor authentication that relies on text messages. While it is hackable, it is still much safer than relying on a password alone to protect you.

The question is how long it will take security researchers to find a way to hack the physical keys as well. When asked if he had already circumvented physical multifactor authentication devices like Google’s keys, Mr. Sabin would offer only: “No comment.”

The New York Times



Nvidia, Joining Big Tech Deal Spree, to License Groq Technology, Hire Executives

The Nvidia logo is seen on a graphic card package in this illustration created on August 19, 2025. (Reuters)
The Nvidia logo is seen on a graphic card package in this illustration created on August 19, 2025. (Reuters)
TT

Nvidia, Joining Big Tech Deal Spree, to License Groq Technology, Hire Executives

The Nvidia logo is seen on a graphic card package in this illustration created on August 19, 2025. (Reuters)
The Nvidia logo is seen on a graphic card package in this illustration created on August 19, 2025. (Reuters)

Nvidia has agreed to license chip technology from startup Groq and hire away its CEO, a veteran of Alphabet's Google, Groq said in a blog post on Wednesday.

The deal follows a familiar pattern in recent years where the world's biggest technology firms pay large sums in deals with promising startups to take their technology and talent but stop short of formally acquiring the target.

Groq specializes in what is known as inference, where artificial intelligence models that have already been trained respond to requests from users. While Nvidia dominates the market for training AI models, it faces much more competition in inference, where traditional rivals such as Advanced Micro Devices have aimed ‌to challenge it ‌as well as startups such as Groq and Cerebras Systems.

Nvidia ‌has ⁠agreed to a "non-exclusive" ‌license to Groq's technology, Groq said. It said its founder Jonathan Ross, who helped Google start its AI chip program, as well as Groq President Sunny Madra and other members of its engineering team, will join Nvidia.

A person close to Nvidia confirmed the licensing agreement.

Groq did not disclose financial details of the deal. CNBC reported that Nvidia had agreed to acquire Groq for $20 billion in cash, but neither Nvidia nor Groq commented on the report. Groq said in its blog post that it will continue to ⁠operate as an independent company with Simon Edwards as CEO and that its cloud business will continue operating.

In similar recent deals, Microsoft's ‌top AI executive came through a $650 million deal with a startup ‍that was billed as a licensing fee, and ‍Meta spent $15 billion to hire Scale AI's CEO without acquiring the entire firm. Amazon hired ‍away founders from Adept AI, and Nvidia did a similar deal this year. The deals have faced scrutiny by regulators, though none has yet been unwound.

"Antitrust would seem to be the primary risk here, though structuring the deal as a non-exclusive license may keep the fiction of competition alive (even as Groq’s leadership and, we would presume, technical talent move over to Nvidia)," Bernstein analyst Stacy Rasgon wrote in a note to clients on Wednesday after Groq's announcement. And Nvidia CEO Jensen Huang's "relationship with ⁠the Trump administration appears among the strongest of the key US tech companies."

Groq more than doubled its valuation to $6.9 billion from $2.8 billion in August last year, following a $750 million funding round in September.

Groq is one of a number of upstarts that do not use external high-bandwidth memory chips, freeing them from the memory crunch affecting the global chip industry. The approach, which uses a form of on-chip memory called SRAM, helps speed up interactions with chatbots and other AI models but also limits the size of the model that can be served.

Groq's primary rival in the approach is Cerebras Systems, which Reuters this month reported plans to go public as soon as next year. Groq and Cerebras have signed large deals in the Middle East.

Nvidia's Huang spent much of his biggest keynote speech of 2025 arguing that ‌Nvidia would be able to maintain its lead as AI markets shift from training to inference.


Italy Watchdog Orders Meta to Halt WhatsApp Terms Barring Rival AI Chatbots

The logo of Meta is seen at Porte de Versailles exhibition center in Paris, France, June 11, 2025. (Reuters)
The logo of Meta is seen at Porte de Versailles exhibition center in Paris, France, June 11, 2025. (Reuters)
TT

Italy Watchdog Orders Meta to Halt WhatsApp Terms Barring Rival AI Chatbots

The logo of Meta is seen at Porte de Versailles exhibition center in Paris, France, June 11, 2025. (Reuters)
The logo of Meta is seen at Porte de Versailles exhibition center in Paris, France, June 11, 2025. (Reuters)

Italy's antitrust authority (AGCM) on Wednesday ordered Meta Platforms to suspend contractual terms ​that could shut rival AI chatbots out of WhatsApp, as it investigates the US tech group for suspected abuse of a dominant position.

A spokesperson for Meta called the decision "fundamentally flawed," and said the emergence of AI chatbots "put a strain on our systems that ‌they were ‌not designed to support".

"We ‌will ⁠appeal," ​the ‌spokesperson added.

The move is the latest in a string by European regulators against Big Tech firms, as the EU seeks to balance support for the sector with efforts to curb its expanding influence.

Meta's conduct appeared capable of restricting "output, market ⁠access or technical development in the AI chatbot services market", ‌potentially harming consumers, AGCM ‍said.

In July, the ‍Italian regulator opened the investigation into Meta over ‍the suspected abuse of a dominant position related to WhatsApp. It widened the probe in November to cover updated terms for the messaging app's business ​platform.

"These contractual conditions completely exclude Meta AI's competitors in the AI chatbot services ⁠market from the WhatsApp platform," the watchdog said.

EU antitrust regulators launched a parallel investigation into Meta last month over the same allegations.

Europe's tough stance - a marked contrast to more lenient US regulation - has sparked industry pushback, particularly by US tech titans, and led to criticism from the administration of US President Donald Trump.

The Italian watchdog said it was coordinating with the European ‌Commission to ensure Meta's conduct was addressed "in the most effective manner".


Amazon Says Blocked 1,800 North Koreans from Applying for Jobs

Amazon logo (Reuters)
Amazon logo (Reuters)
TT

Amazon Says Blocked 1,800 North Koreans from Applying for Jobs

Amazon logo (Reuters)
Amazon logo (Reuters)

US tech giant Amazon said it has blocked over 1,800 North Koreans from joining the company, as Pyongyang sends large numbers of IT workers overseas to earn and launder funds.

In a post on LinkedIn, Amazon's Chief Security Officer Stephen Schmidt said last week that North Korean workers had been "attempting to secure remote IT jobs with companies worldwide, particularly in the US".

He said the firm had seen nearly a one-third rise in applications by North Koreans in the past year, reported AFP.

The North Koreans typically use "laptop farms" -- a computer in the United States operated remotely from outside the country, he said.

He warned the problem wasn't specific to Amazon and "is likely happening at scale across the industry".

Tell-tale signs of North Korean workers, Schmidt said, included wrongly formatted phone numbers and dodgy academic credentials.

In July, a woman in Arizona was sentenced to more than eight years in prison for running a laptop farm helping North Korean IT workers secure remote jobs at more than 300 US companies.

The scheme generated more than $17 million in revenue for her and North Korea, officials said.

Last year, Seoul's intelligence agency warned that North Korean operatives had used LinkedIn to pose as recruiters and approach South Koreans working at defense firms to obtain information on their technologies.

"North Korea is actively training cyber personnel and infiltrating key locations worldwide," Hong Min, an analyst at the Korea Institute for National Unification, told AFP.

"Given Amazon's business nature, the motive seems largely economic, with a high likelihood that the operation was planned to steal financial assets," he added.

North Korea's cyber-warfare program dates back to at least the mid-1990s.

It has since grown into a 6,000-strong cyber unit known as Bureau 121, which operates from several countries, according to a 2020 US military report.

In November, Washington announced sanctions on eight individuals accused of being "state-sponsored hackers", whose illicit operations were conducted "to fund the regime's nuclear weapons program" by stealing and laundering money.

The US Department of the Treasury has accused North Korea-affiliated cybercriminals of stealing over $3 billion over the past three years, primarily in cryptocurrency.