floofloof@lemmy.ca to Technology@beehaw.orgEnglish · 4 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square21fedilinkarrow-up187cross-posted to: technology@lemmit.onlinehardware@lemmy.world
arrow-up187external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comfloofloof@lemmy.ca to Technology@beehaw.orgEnglish · 4 months agomessage-square21fedilinkcross-posted to: technology@lemmit.onlinehardware@lemmy.world
minus-squareTheButtonJustSpins@infosec.publinkfedilinkEnglisharrow-up7·4 months agoThanks! That makes a lot of sense.
Thanks! That makes a lot of sense.