• 0 Posts
  • 206 Comments
Joined 1 year ago
cake
Cake day: June 29th, 2023

help-circle






  • I’m not sure I necessarily agree. Your assessment is correct, but I don’t really think this situation is security by obscurity. Like most things in computer security, you have to weight the pros and cons to each approach.

    Yubico used components that all passed Common Criteria certification and built their product in a read-only configuration to prevent any potential shenanigans with vulnerable firmware updates. This approach almost entirely protects them from supply-chain attacks like what happened with ZX a few months back.

    To exploit this vulnerability you need physical access to the device, a ton of expensive equipment, and an incredibly deep knowledge in digital cryptography. This is effectively a non-issue for your average Yubikey user. The people this does affect will be retiring and replacing their Yubikeys with the newest models ASAP.











  • Godort@lemm.eeto196@lemmy.blahaj.zoneRule
    link
    fedilink
    arrow-up
    177
    ·
    1 month ago

    The reason this is done is because you can see everything your browser is doing, but you can’t see everything an application is doing without disassembling it.

    I want very much to go back to websites. Apps are stupid.