BrikoX@lemmy.zip to Privacy Guides@lemmy.one · 2 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square29fedilinkarrow-up10arrow-down10 cross-posted to: cybersecurity@sh.itjust.works
arrow-up10arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comBrikoX@lemmy.zip to Privacy Guides@lemmy.one · 2 months agomessage-square29fedilink cross-posted to: cybersecurity@sh.itjust.works
minus-squarePup Biru@aussie.zonelinkfedilinkEnglisharrow-up0·2 months agoapparently this is an issue with some part of the hardware that lots of hardware security devices use too, so not as simple as just buying/building an alternative
apparently this is an issue with some part of the hardware that lots of hardware security devices use too, so not as simple as just buying/building an alternative