Protected by TSARKA
Protected by TSARKA
Protected by TSARKA
Protection that cannot be tricked. At all
Phishing-resistant USB key for two-factor authentication into accounts (Google, Facebook, X, etc.) with FIDO2 technology, implemented on a controller with additional protection.
  • Impossible to fake or intercept
    The private key never leaves the device. Even if you're on a phishing site — you're safe; attackers won't be able to extract the key.
  • One key — dozens of services
    Works with Google, Facebook, X (Twitter), Binance, GitHub, Amazon and others. All in one key.
  • Immune to viruses and password loss
    This is not an app – it’s hardware. It doesn’t get infected and doesn’t break from OS updates. With it, you’re protected even if your password is compromised.
“Nothing will ever happen to me…” – a thought that crossed the minds of 90% of victims...
Everything evolves: deception — more convincing, viruses — smarter, attackers — faster.
"I'm getting emails about login attempts and lots of spam. Losing access to your Google account is like letting a stranger into your apartment."
Yernat
Graphic Designer
"My blogger friend had their Instagram stolen. Years of work — thrown away in one night."
Temirlan
Bloger
"I work with clients’ advertising accounts. I don’t want to let a client down and be the reason for wasted budget."
Yenlik
Marketing
Not all multi-factor authentication is equally reliable
Stay one step ahead of cyber threats with the proven FIDO2 technology that cannot be bypassed — unlike vulnerable methods such as SMS codes, one-time passwords, and mobile apps. This is technology ready for future threats and compliant with modern cybersecurity standards. Our key is designed on a special controller, with additional security features and a cryptography accelerator.
The future belongs to cryptography, not passwords
Passwords are becoming less and less reliable. More and more services are switching to passwordless login — using cryptographic authentication, where keys are stored exclusively by the user. Physical USB keys like Tautan use proven algorithms resistant to phishing and hacking. They don’t depend on SMS, email, or mobile apps — only pure cryptography, with security ensured at the hardware level.
How it works
Support for any operating system of smartphones, computers, laptops, and tablets

You enable the second factor via a USB key
This can be done in Google, Binance, GitHub, Facebook, X, and other services that support physical authentication
When logging into an account, you insert the key into the USB port
The site requests confirmation — you enter the PIN code and press the button on the device
Tautan only responds to the “right” site
Even if you end up on a fake site, the key won’t work. It only works with the services it was previously trusted with
Now no one will get access to your account
Tautan is only needed when logging in from a new device or performing sensitive actions. For example, changing a password or withdrawing funds.
Protects your services:
Who is Tautan Secure Key for?
For everyone who uses Google
Google has become the entry point to all accounts where we store messages, files, and passwords. All this must be under strong lock and key. With our key, you will have access to Google’s Advanced Protection feature.
For crypto investors who strive to protect their savings as much as possible
Use the best protection mechanics! Threats evolve every day, but with a USB key – you fully control the second factor of authentication. "This is your key – this is your money!"
For bloggers who don’t want years of work to disappear
Your account will remain yours alone, and you definitely won’t be part of stories about broken contracts and lost followers.
For those who want to protect their family from phishing and social engineering
Phishing and social engineering primarily exploit trust: children click links, parents share passwords. Tautan stops these tricks: one touch — and all family accounts are securely protected without passwords and SMS codes.
Protected by TSARKA
Protected by TSARKA
Protected by TSARKA
Protected by TSARKA
Protected by TSARKA
99.9% protection from fraudsters
Phishing attacks, password brute force, and SMS interception become useless with our device! It works on FIDO2 technology trusted by Amazon, Intel, Microsoft, Apple, Meta, Mastercard, Visa, PayPal, and many others
Place a pre-order
More about FIDO2 technology
Protected by TSARKA
Protected by TSARKA
Protected by TSARKA
Protected by TSARKA
Protected by TSARKA
Roadmap
Plans for the near future
2025:
2025:
Features
EDS, PIV — all this will be available to users who buy tokens now thanks to the update system
For business
SDK for FIDO2 implementation
For your security
Personal cybersecurity application
2026:
2026:
New device
Tautan Pro с NFC
Localization of production
Technical description
Supported devices
Computers, laptops, tablets, smartphones
Number of keys
Up to 60 keys
Protection factors
Edge touch sensors and PIN code upon connection
Operating systems
Windows, Linux, Android, iOS, MacOS
Authentication protocols
FIDO2, PIV, HOTP
Power supply
Does not require a battery
News
Any questions left?
Our team will be happy to answer all your questions, help you choose the best solution for your business, and explain how we can be useful specifically to you. Write to us!
Astana, Kabanbay
Batyr Avenue 51/1
10:00–18:00
Resident
© 2014 - 2025 «TSARKA Labs»
© 2015 - 2025 «Cyber Attack Analysis and Investigation Center»
Made on
Tilda