BrikoX@lemmy.zip to Privacy Guides@lemmy.one · 2 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square33fedilinkarrow-up1212arrow-down10 cross-posted to: cybersecurity@sh.itjust.works
arrow-up1212arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comBrikoX@lemmy.zip to Privacy Guides@lemmy.one · 2 months agomessage-square33fedilink cross-posted to: cybersecurity@sh.itjust.works
minus-squarehash@lemmy.worldlinkfedilinkEnglisharrow-up11·2 months agofor reference 5.7 began shipping with keys May of this year.
for reference 5.7 began shipping with keys May of this year.