Nemeski to [email protected] • 16 days agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square2fedilinkarrow-up130arrow-down10cross-posted to: [email protected][email protected][email protected]
arrow-up130arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comNemeski to [email protected] • 16 days agomessage-square2fedilinkcross-posted to: [email protected][email protected][email protected]
minus-square@[email protected]linkfedilink4•edit-216 days agoThe detailed disclosure PDF (88 pages) is a great read if you’re interested in the gory details. The team here did excellent work and there’s a lot of interesting avenues opened for future research.
The detailed disclosure PDF (88 pages) is a great read if you’re interested in the gory details. The team here did excellent work and there’s a lot of interesting avenues opened for future research.