floofloof@lemmy.ca to Technology@beehaw.orgEnglish · 26 days agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square21fedilinkarrow-up187arrow-down10cross-posted to: cybersecurity@zerobytes.monstermain@0xdd.org.rutechnology@zerobytes.monsteryubikey@lemmy.cahardware@lemmy.world
arrow-up187arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comfloofloof@lemmy.ca to Technology@beehaw.orgEnglish · 26 days agomessage-square21fedilinkcross-posted to: cybersecurity@zerobytes.monstermain@0xdd.org.rutechnology@zerobytes.monsteryubikey@lemmy.cahardware@lemmy.world
that makes sense. Thank you.