BrikoX@lemmy.zip to Privacy Guides@lemmy.one · 2 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square33fedilinkarrow-up1215arrow-down10 cross-posted to: cybersecurity@sh.itjust.works
arrow-up1215arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comBrikoX@lemmy.zip to Privacy Guides@lemmy.one · 2 months agomessage-square33fedilink cross-posted to: cybersecurity@sh.itjust.works
minus-squarebean@lemmy.worldlinkfedilinkEnglisharrow-up2·2 months agoThe fact that this happened is surprising in general, but not super practical. What’s the big deal? A: It affects other types of hardware which also used these crypto libraries. Some are easier to address than others.
The fact that this happened is surprising in general, but not super practical.
What’s the big deal? A: It affects other types of hardware which also used these crypto libraries. Some are easier to address than others.