floofloof@lemmy.ca to Technology@beehaw.orgEnglish · 16 days agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square19fedilinkarrow-up11arrow-down10cross-posted to: main@0xdd.org.ru
arrow-up11arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comfloofloof@lemmy.ca to Technology@beehaw.orgEnglish · 16 days agomessage-square19fedilinkcross-posted to: main@0xdd.org.ru
minus-squareBCsven@lemmy.calinkfedilinkarrow-up0·16 days agoTotally a non issue unless a government arrested somebody with the intent to gain their key because : "The attacks require about $11,000 worth of equipment and a sophisticated understanding of electrical and cryptographic engineering. "
minus-squareNaN@lemmy.sdf.orglinkfedilinkEnglisharrow-up0·15 days agoIf they arrest someone to gain access to their key, they don’t need this attack to use their key. They can just use their key.
Totally a non issue unless a government arrested somebody with the intent to gain their key because : "The attacks require about $11,000 worth of equipment and a sophisticated understanding of electrical and cryptographic engineering. "
If they arrest someone to gain access to their key, they don’t need this attack to use their key. They can just use their key.