floofloof@lemmy.ca to Technology@beehaw.orgEnglish · 4 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square21fedilinkarrow-up186arrow-down10cross-posted to: yubikey@lemmy.cahardware@lemmy.world
arrow-up186arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comfloofloof@lemmy.ca to Technology@beehaw.orgEnglish · 4 months agomessage-square21fedilinkcross-posted to: yubikey@lemmy.cahardware@lemmy.world
minus-squareBCsven@lemmy.calinkfedilinkarrow-up1·4 months agoSorry I was thinking of when you have yubikey setup with PIN code for access. But yeah, I guess the attack vector is clandestine theft and replace.
Sorry I was thinking of when you have yubikey setup with PIN code for access. But yeah, I guess the attack vector is clandestine theft and replace.