BrikoX@lemmy.zip to Privacy Guides@lemmy.one · 16 days agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square31fedilinkarrow-up1199arrow-down10 cross-posted to: cybersecurity@sh.itjust.works
arrow-up1199arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comBrikoX@lemmy.zip to Privacy Guides@lemmy.one · 16 days agomessage-square31fedilink cross-posted to: cybersecurity@sh.itjust.works
minus-squarebonn2@lemm.eelinkfedilinkEnglisharrow-up16·16 days agoAnd this is why Duress passwords exist
And this is why Duress passwords exist