Have strong opinions, but I welcome any civil fact-based discussion.

Mastodon: @BrikoX@freeradical.zone

  • 13 Posts
  • 22 Comments
Joined 1 year ago
cake
Cake day: July 9th, 2023

help-circle



  • While the researchers have confirmed all YubiKey 5 series models can be cloned, they haven’t tested other devices using the microcontroller, such as the SLE78 made by Infineon and successor microcontrollers known as the Infineon Optiga Trust M and the Infineon Optiga TPM. The researchers suspect that any device using any of these three microcontrollers and the Infineon cryptographic library contains the same vulnerability.

    Both. The cryptographic library in question is also used in other cryptographic applications too, so it’s a huge mess.





















  • It’s there for a reason. You can’t easily create a spam waves if you need a phone number to create an account. And they added usernames now, so you don’t need to share your phone number with people you want to talk to. It’s just there to create an account and can be hidden after that.

    There is Session, that uses UUIDs for names with no phone number requirement, which is basically a fork of Signal with decentralized Loki on top of it.