Leo@lemmy.linuxuserspace.showM to Linux and Tech News@lemmy.linuxuserspace.showEnglish · 20 days agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square6fedilinkarrow-up121arrow-down11
arrow-up120arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comLeo@lemmy.linuxuserspace.showM to Linux and Tech News@lemmy.linuxuserspace.showEnglish · 20 days agomessage-square6fedilink
minus-squareTelorand@reddthat.comlinkfedilinkEnglisharrow-up2·19 days agoAll they would have to do to mitigate the threat is buy new keys. The vulnerability doesn’t exist in their keys since May.
All they would have to do to mitigate the threat is buy new keys. The vulnerability doesn’t exist in their keys since May.