this post was submitted on 03 Sep 2024
56 points (95.2% liked)

Hardware

636 readers
120 users here now

All things related to technology hardware, with a focus on computing hardware.


Rules (Click to Expand):

  1. Follow the Lemmy.world Rules - https://mastodon.world/about

  2. Be kind. No bullying, harassment, racism, sexism etc. against other users.

  3. No Spam, illegal content, or NSFW content.

  4. Please stay on topic, adjacent topics (e.g. software) are fine if they are strongly relevant to technology hardware. Another example would be business news for hardware-focused companies.

  5. Please try and post original sources when possible (as opposed to summaries).

  6. If posting an archived version of the article, please include a URL link to the original article in the body of the post.


Some other hardware communities across Lemmy:

Icon by "icon lauk" under CC BY 3.0

founded 1 year ago
MODERATORS
 

Edit: Yubico has issued a security advisory on the vulnerability https://www.yubico.com/support/security-advisories/ysa-2024-03/

you are viewing a single comment's thread
view the rest of the comments
[–] Desistance@lemmy.world 15 points 2 months ago (4 children)

Not much of a vulnerability when you need physical access.

[–] jewbacca117@lemmy.world 10 points 2 months ago

It's like saying a bank is vulnerable if you have enough drills and guns

[–] lemmyng@lemmy.ca 8 points 2 months ago

On the contrary. China for example is known for accessing traveler electronics both during customs/immigration checks and in their hotels. Unless the victim carries their key on their person at all times without fault it can be cloned without them knowing.

[–] eyeon@lemmy.world 5 points 2 months ago

i have physical access to my own yubikey and can't make a backup copy. someone else who only temporarily has access to it being able to do so is definitely a vulnerability.