@floofloof@lemmy.ca to Technology@beehaw.orgEnglish • 2 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square21fedilinkarrow-up187cross-posted to: technology@lemmit.onlinehardware@lemmy.world
arrow-up187external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.com@floofloof@lemmy.ca to Technology@beehaw.orgEnglish • 2 months agomessage-square21fedilinkcross-posted to: technology@lemmit.onlinehardware@lemmy.world
minus-square@BCsven@lemmy.calinkfedilink12•2 months agoTotally a non issue unless a government arrested somebody with the intent to gain their key because : "The attacks require about $11,000 worth of equipment and a sophisticated understanding of electrical and cryptographic engineering. "
minus-square@Bitrot@lemmy.sdf.orglinkfedilinkEnglish3•2 months agoIf they arrest someone to gain access to their key, they don’t need this attack to use their key. They can just use their key.
minus-square@BCsven@lemmy.calinkfedilink1•2 months agoSorry I was thinking of when you have yubikey setup with PIN code for access. But yeah, I guess the attack vector is clandestine theft and replace.
Totally a non issue unless a government arrested somebody with the intent to gain their key because : "The attacks require about $11,000 worth of equipment and a sophisticated understanding of electrical and cryptographic engineering. "
If they arrest someone to gain access to their key, they don’t need this attack to use their key. They can just use their key.
Sorry I was thinking of when you have yubikey setup with PIN code for access. But yeah, I guess the attack vector is clandestine theft and replace.