floofloof@lemmy.ca to Technology@beehaw.orgEnglish · 4 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square21fedilinkarrow-up183arrow-down10cross-posted to: cybersecurity@zerobytes.monstermain@0xdd.org.ruyubikey@lemmy.catechnology@lemmit.onlinehardware@lemmy.world
arrow-up183arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comfloofloof@lemmy.ca to Technology@beehaw.orgEnglish · 4 months agomessage-square21fedilinkcross-posted to: cybersecurity@zerobytes.monstermain@0xdd.org.ruyubikey@lemmy.catechnology@lemmit.onlinehardware@lemmy.world
minus-squarexylem@beehaw.orglinkfedilinkEnglisharrow-up4·4 months agoPhysical anti-tamper, while important for this type of device, wouldn’t have helped for this particular attack. It’s an electromagnetic side channel, so they don’t even have to be touching the the thing to collect data.
Physical anti-tamper, while important for this type of device, wouldn’t have helped for this particular attack. It’s an electromagnetic side channel, so they don’t even have to be touching the the thing to collect data.