Leo@lemmy.linuxuserspace.showM to Linux and Tech News@lemmy.linuxuserspace.showEnglish · 2 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square6fedilinkarrow-up120arrow-down11cross-posted to: pulse_of_truth@infosec.pubarstechnica_index@rss.ponder.cat
arrow-up119arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comLeo@lemmy.linuxuserspace.showM to Linux and Tech News@lemmy.linuxuserspace.showEnglish · 2 months agomessage-square6fedilinkcross-posted to: pulse_of_truth@infosec.pubarstechnica_index@rss.ponder.cat
minus-squareTelorand@reddthat.comlinkfedilinkEnglisharrow-up2·2 months agoAll they would have to do to mitigate the threat is buy new keys. The vulnerability doesn’t exist in their keys since May.
All they would have to do to mitigate the threat is buy new keys. The vulnerability doesn’t exist in their keys since May.