![]() ![]() Who are you? An ordinary Joe or a person with a position in a vital company? How do you value your data and your accounts? How much are you willing to invest in protection? etc… Yes, Yubico uses not-very-expensive chip, but the price also includes proper design and R&D as well.Īnyway, it’s up to you and your threat model. If you see cheap price, that most likely means that some corners were cut. What’s really hard - to create proper and secure implementation. It’s not hard to create a FIDO2/U2F implementation in hardware. Correct algorithm implementation, without flaws. What’s more important is the proper implementation of secure element. If you deliberately were given the rigged key, everything is possible). No way to establish a connection with the company’s servers (at least until you’re not a subject of targeted attack. Ordinary keys contain only a secure MCU that generates the secret key and performs operations with it. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |