Det unika med yubikey är att de är utvecklade och tillverkade i Sverige och USA. De har funnits med länge och är ordentligt testade.
Så om du inte behöver alla funktioner som de dyrare nycklarna erbjuder så kanske deras enklaste variant kan vara ett alternativ, som pine-orange skrev? FIDO only key
Ett alternative kanske skulle kunna vara Token2. Har ingen koll på om det är bra eller inte, så råder dig att undersöka det mera innan köp.
Token2 is headquartered in Geneva, Switzerland
https://www.token2.com/shop/category/fido2-keys
Deras faq säger:
Where are your products manufactured?
For many of our products, we are considered a systems integrator rather than a manufacturer, as our products may contain different components, such as batteries, NFC chips or plastic cases, from various countries. According to Article 60(2) UCC, when two or more countries are involved in the manufacture of the product, it shall be deemed to originate in the country or territory where they underwent their last, substantial, economically justified processing or working. In this context, we declare the country of the origin as Switzerland where allowed (i.e. in customs declaration). This is not, however, enough to declare the product as Swiss-made as Switzerland has a stricter rule on this: at least 60% of the components must be produced in Switzerland. Currently, having more than 60% of the components produced in Switzerland would make the final price of the product several times higher. We are still working on moving the production to Switzerland while keeping the costs at an affordable level.
Nevertheless, be assured that all the production phases are under the thorough control of our specialists, and the components supplied by our partners undergo regular quality checks. The software, firmware, and sensitive data (such as seeds) handling operations are done in Switzerland. Furthermore, our business model is based not just on selling or reselling hardware, but more on providing full high quality technical support at all stages, starting from choosing the most suitable and cost-effective device model to its activation and configuration with any compatible authentication system used by the client.