• Alphane Moon@lemmy.worldM
    link
    fedilink
    English
    arrow-up
    29
    ·
    4 months ago

    “The attacker would need physical possession of the YubiKey, Security Key, or YubiHSM, knowledge of the accounts they want to target, and specialized equipment to perform the necessary attack. Depending on the use case, the attacker may also require additional knowledge including username, PIN, account password, or authentication key.”