Nemeski@lemm.ee to Yubikey · 2 years agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square3linkfedilinkarrow-up133arrow-down10cross-posted to: cybersecurity@zerobytes.monstermain@0xdd.org.rutechnology@beehaw.orgtechnology@lemmit.onlinehardware@lemmy.world
arrow-up133arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comNemeski@lemm.ee to Yubikey · 2 years agomessage-square3linkfedilinkcross-posted to: cybersecurity@zerobytes.monstermain@0xdd.org.rutechnology@beehaw.orgtechnology@lemmit.onlinehardware@lemmy.world
minus-squareGameGodlinkfedilinkarrow-up5·2 years agoThe detailed disclosure PDF (88 pages) is a great read if you’re interested in the gory details. The team here did excellent work and there’s a lot of interesting avenues opened for future research.
The detailed disclosure PDF (88 pages) is a great read if you’re interested in the gory details. The team here did excellent work and there’s a lot of interesting avenues opened for future research.