bOt@zerobytes.monsterM to cybersecurity@zerobytes.monster · 4 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10file-textcross-posted to: main@0xdd.org.rutechnology@beehaw.orgyubikey@lemmy.catechnology@lemmit.onlinehardware@lemmy.world
arrow-up11arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.combOt@zerobytes.monsterM to cybersecurity@zerobytes.monster · 4 months agomessage-square0fedilinkfile-textcross-posted to: main@0xdd.org.rutechnology@beehaw.orgyubikey@lemmy.catechnology@lemmit.onlinehardware@lemmy.world