• NaN
    link
    English
    312 days ago

    If they arrest someone to gain access to their key, they don’t need this attack to use their key. They can just use their key.

    • @BCsven@lemmy.ca
      link
      fedilink
      112 days ago

      Sorry I was thinking of when you have yubikey setup with PIN code for access. But yeah, I guess the attack vector is clandestine theft and replace.