BrikoX@lemmy.zip to Privacy Guides@lemmy.one · 5 个月前YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square33fedilinkarrow-up1215arrow-down10 cross-posted to: cybersecurity@sh.itjust.works
arrow-up1215arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comBrikoX@lemmy.zip to Privacy Guides@lemmy.one · 5 个月前message-square33fedilink cross-posted to: cybersecurity@sh.itjust.works
minus-squarebean@lemmy.worldlinkfedilinkEnglisharrow-up2·5 个月前The fact that this happened is surprising in general, but not super practical. What’s the big deal? A: It affects other types of hardware which also used these crypto libraries. Some are easier to address than others.
The fact that this happened is surprising in general, but not super practical.
What’s the big deal? A: It affects other types of hardware which also used these crypto libraries. Some are easier to address than others.