BrikoX@lemmy.zip to Privacy Guides@lemmy.one · 1 month agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square33fedilinkarrow-up1214arrow-down10
arrow-up1214arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comBrikoX@lemmy.zip to Privacy Guides@lemmy.one · 1 month agomessage-square33fedilink
minus-squarebean@lemmy.worldlinkfedilinkEnglisharrow-up2·30 days agoThe fact that this happened is surprising in general, but not super practical. What’s the big deal? A: It affects other types of hardware which also used these crypto libraries. Some are easier to address than others.
The fact that this happened is surprising in general, but not super practical.
What’s the big deal? A: It affects other types of hardware which also used these crypto libraries. Some are easier to address than others.