1
00:00:00,000 --> 00:00:04,920
We're also used to carrying our phones around that it probably feels like you're missing a body part

2
00:00:04,920 --> 00:00:08,520
if you accidentally leave home without it. And to be fair, it feels this way partly

3
00:00:08,520 --> 00:00:12,240
because they're do-it-all devices that have obviated the need to carry around gadgets

4
00:00:12,240 --> 00:00:15,920
like digital cameras and audio players. But it turns out there are still other pieces

5
00:00:15,920 --> 00:00:18,920
of mobile tech that are worth carrying around. And I'm not talking about obvious stuff

6
00:00:18,920 --> 00:00:22,080
like smartwatches, fitness trackers, or the glasses that make you look like

7
00:00:22,080 --> 00:00:25,520
you just walked off the set of Star Trek. One of the first things you should throw in your bag,

8
00:00:25,520 --> 00:00:29,160
along with your laptop, is this guy, the Kensington Security Locked,

9
00:00:29,160 --> 00:00:32,960
or sometimes known as the K-Lock. If you ever wonder what this random hole

10
00:00:32,960 --> 00:00:37,280
on the side of most laptops is, it's a slot that the K-Lock uses to secure the system

11
00:00:37,280 --> 00:00:42,000
to a mobile object using a built-in metal cord. K-Locks have been around since the early 1990s

12
00:00:42,000 --> 00:00:46,200
and haven't really changed much since then. Technology has evolved dramatically,

13
00:00:46,200 --> 00:00:50,840
but the art of wrapping cables around poles hasn't. Although Kensington Locks aren't made of vibranium

14
00:00:50,840 --> 00:00:55,280
and it's possible to cut through them, they are useful for preventing opportunistic thieves

15
00:00:55,280 --> 00:00:58,960
from just running off with your equipment and data if you're in a public place like Starbucks

16
00:00:58,960 --> 00:01:02,320
and someone tries to steal your laptop while you're fetching your latte.

17
00:01:02,320 --> 00:01:06,840
Next up, hardware security key. These are small enough to fit comfortably on your key chain

18
00:01:06,840 --> 00:01:12,080
and might just be the most useful item on it. The basic idea is to use these as your second factor

19
00:01:12,080 --> 00:01:16,040
or two-factor authentication instead of a number-generating authenticator app

20
00:01:16,040 --> 00:01:21,000
or having a code texted or emailed to you. Don't use text codes, they're awful.

21
00:01:21,000 --> 00:01:25,840
Whenever you log into an account you've linked to your hardware key, you'll be prompted to either insert it into a USB

22
00:01:25,840 --> 00:01:30,080
or Lightning port, for instance, or connect it wirelessly with NFC or Bluetooth,

23
00:01:30,080 --> 00:01:35,040
especially handy if you're still using it with your phone. Some hardware keys offer enhanced durability

24
00:01:35,040 --> 00:01:38,080
so you won't be locked out of your accounts if you accidentally jump into a pool

25
00:01:38,080 --> 00:01:41,800
with your keys in your pocket and fancier ones even have fingerprint readers built in

26
00:01:41,800 --> 00:01:45,880
for an added layer of security and convenience. Many different companies offer hardware keys,

27
00:01:45,880 --> 00:01:49,720
including Ubiko, Google, Thetis, and the aforementioned Kensington.

28
00:01:49,720 --> 00:01:52,960
If you're always misplacing things, then consider picking up some tracking text.

29
00:01:52,960 --> 00:01:56,360
These can be attached to small, valuable belongings so if one of them gets misplaced,

30
00:01:56,360 --> 00:02:01,120
you can whip out your phone and find which couch cushion it's slipped under. Popular brands like Tile and Samsung

31
00:02:01,120 --> 00:02:05,280
make tracking tags that work with Bluetooth, while Apple's AirTags use a combination of Bluetooth

32
00:02:05,280 --> 00:02:10,000
and Ultra Wideband for more precise tracking. Though, predictably, AirTags can only be paired

33
00:02:10,000 --> 00:02:13,360
with iDevices, but AirTags do offer the advantage

34
00:02:13,360 --> 00:02:18,520
of leveraging Apple's Find My Device network. So if your valuable item got left behind miles away,

35
00:02:18,520 --> 00:02:23,000
there's a good enough chance you might be able to locate it as long as it's in a reasonably populated area

36
00:02:23,000 --> 00:02:26,760
because it's using everybody else's phones to track it. And if you lose your actual phone,

37
00:02:26,760 --> 00:02:31,320
some tracking tags allow you to press a button on them, which will make your phone give off an audible alarm

38
00:02:31,320 --> 00:02:34,360
if you have the connected app installed. So you can find your phone too.

39
00:02:34,360 --> 00:02:37,640
But we'd be remiss if we didn't also mention GPS and GSM tags.

40
00:02:37,640 --> 00:02:41,680
And as long as you can stomach the subscription fees, you can locate the suitcase your airline lost,

41
00:02:41,680 --> 00:02:45,560
even if it's on the other side of the continent, because honestly, it just seems like airlines

42
00:02:45,560 --> 00:02:50,240
throw your suitcases in a big cannon and launch them. Hope they land in the right damn place

43
00:02:50,240 --> 00:02:52,440
because why do I keep losing my fricking luggage?

44
00:02:53,360 --> 00:02:56,920
Thanks for watching. Hit like or dislike. You can check out our other videos.

45
00:02:56,920 --> 00:03:02,320
You can comment with video suggestions down below. And don't forget to subscribe and hit the notification bell

46
00:03:02,320 --> 00:03:06,080
so you get the videos when they come out.
