BrikoX@lemmy.zip to Privacy Guides@lemmy.one · 6 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square32fedilinkarrow-up1207arrow-down10
arrow-up1207arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comBrikoX@lemmy.zip to Privacy Guides@lemmy.one · 6 months agomessage-square32fedilink
minus-squarebonn2@lemm.eelinkfedilinkEnglisharrow-up18·6 months agoAnd this is why Duress passwords exist
xkcd
And this is why Duress passwords exist
deleted by creator