• @[email protected]
    link
    fedilink
    English
    32 months ago

    If they arrest someone to gain access to their key, they don’t need this attack to use their key. They can just use their key.

    • @[email protected]
      link
      fedilink
      12 months ago

      Sorry I was thinking of when you have yubikey setup with PIN code for access. But yeah, I guess the attack vector is clandestine theft and replace.