floofloof to Technology@beehaw.orgEnglish · 3 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square23fedilinkarrow-up187arrow-down10cross-posted to: [email protected][email protected]yubikey[email protected][email protected]
arrow-up187arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comfloofloof to Technology@beehaw.orgEnglish · 3 months agomessage-square23fedilinkcross-posted to: [email protected][email protected]yubikey[email protected][email protected]
minus-squareBCsvenlinkfedilinkarrow-up1·3 months agoSorry I was thinking of when you have yubikey setup with PIN code for access. But yeah, I guess the attack vector is clandestine theft and replace.
Sorry I was thinking of when you have yubikey setup with PIN code for access. But yeah, I guess the attack vector is clandestine theft and replace.