floofloof@lemmy.ca to Technology@beehaw.orgEnglish · 7 个月前YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square21fedilinkarrow-up182cross-posted to: yubikey@lemmy.cahardware@lemmy.world
arrow-up182external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comfloofloof@lemmy.ca to Technology@beehaw.orgEnglish · 7 个月前message-square21fedilinkcross-posted to: yubikey@lemmy.cahardware@lemmy.world
minus-squareBitrot@lemmy.sdf.orglinkfedilinkEnglisharrow-up3·7 个月前If they arrest someone to gain access to their key, they don’t need this attack to use their key. They can just use their key.
minus-squareBCsven@lemmy.calinkfedilinkarrow-up1·7 个月前Sorry I was thinking of when you have yubikey setup with PIN code for access. But yeah, I guess the attack vector is clandestine theft and replace.
If they arrest someone to gain access to their key, they don’t need this attack to use their key. They can just use their key.
Sorry I was thinking of when you have yubikey setup with PIN code for access. But yeah, I guess the attack vector is clandestine theft and replace.