Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square2fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 months agomessage-square2fedilink
minus-squaresun_is_ra@sh.itjust.workslinkfedilinkEnglisharrow-up0·3 months agoTLDR; the attack is very sophisticated, require hardware access and specialized tools. On the other hand its not possible to patch the vulnerability
TLDR; the attack is very sophisticated, require hardware access and specialized tools. On the other hand its not possible to patch the vulnerability