floofloof@lemmy.ca to Technology@beehaw.orgEnglish · 1 year agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square21linkfedilinkarrow-up187arrow-down10cross-posted to: yubikey@lemmy.catechnology@lemmit.onlinehardware@lemmy.world
arrow-up187arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comfloofloof@lemmy.ca to Technology@beehaw.orgEnglish · 1 year agomessage-square21linkfedilinkcross-posted to: yubikey@lemmy.catechnology@lemmit.onlinehardware@lemmy.world
that makes sense. Thank you.