minus-squareBjornir@programming.devtoPrivacy Guides@lemmy.one•YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channellinkfedilinkEnglisharrow-up2·2 months agoCouldn’t you just use the yubikey like normal if you have physical access to it instead of copying it ? linkfedilink
minus-squareBjornir@programming.devtoSelfhosted@lemmy.world•Latency with pi-hole + wireguardlinkfedilinkEnglisharrow-up8·3 months agoNot for the duration of the stream, only for initial page load linkfedilink
Couldn’t you just use the yubikey like normal if you have physical access to it instead of copying it ?