• Bitrot@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    3
    ·
    3 months ago

    If they arrest someone to gain access to their key, they don’t need this attack to use their key. They can just use their key.

    • BCsven
      link
      fedilink
      arrow-up
      1
      ·
      3 months ago

      Sorry I was thinking of when you have yubikey setup with PIN code for access. But yeah, I guess the attack vector is clandestine theft and replace.