floofloof@lemmy.ca to Technology@beehaw.orgEnglish · 2 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square15fedilinkarrow-up135arrow-down10cross-posted to: main@0xdd.org.rutechnology@lemmit.onlinehardware@lemmy.world
arrow-up135arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comfloofloof@lemmy.ca to Technology@beehaw.orgEnglish · 2 months agomessage-square15fedilinkcross-posted to: main@0xdd.org.rutechnology@lemmit.onlinehardware@lemmy.world
minus-squareBCsven@lemmy.calinkfedilinkarrow-up10·2 months agoTotally a non issue unless a government arrested somebody with the intent to gain their key because : "The attacks require about $11,000 worth of equipment and a sophisticated understanding of electrical and cryptographic engineering. "
Totally a non issue unless a government arrested somebody with the intent to gain their key because : "The attacks require about $11,000 worth of equipment and a sophisticated understanding of electrical and cryptographic engineering. "