floofloof@lemmy.ca to Technology@beehaw.orgEnglish · 4 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square21fedilinkarrow-up183arrow-down10cross-posted to: cybersecurity@zerobytes.monstermain@0xdd.org.ruyubikey@lemmy.catechnology@lemmit.onlinehardware@lemmy.world
arrow-up183arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comfloofloof@lemmy.ca to Technology@beehaw.orgEnglish · 4 months agomessage-square21fedilinkcross-posted to: cybersecurity@zerobytes.monstermain@0xdd.org.ruyubikey@lemmy.catechnology@lemmit.onlinehardware@lemmy.world
minus-squaresweng@programming.devlinkfedilinkarrow-up1·4 months agoIs Yubico actually claiming it is more secure by not being open source?
Is Yubico actually claiming it is more secure by not being open source?