1. Knowledge Base
  2. 5 Factor Authentication

Is the ring or its authentication protocol hackable?

The ring uses the FIDO2 protocol for authentication, and 128bit encryption for communication and authentication, which would require over 1 billion years of current supercomputer power to hack. Coupled with the storage of credentials on a dedicated, biometrically-secured hardware device, Token provides an effectively unhackable authentication solution.