• NaN
    link
    fedilink
    English
    315 days ago

    If they arrest someone to gain access to their key, they don’t need this attack to use their key. They can just use their key.

    • @BCsven@lemmy.ca
      link
      fedilink
      115 days ago

      Sorry I was thinking of when you have yubikey setup with PIN code for access. But yeah, I guess the attack vector is clandestine theft and replace.