When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
This includes the YubiKey 5, considered the most widely used hardware token based on the FIDO standard.
And thats exactly what NinjaLab did, by employing a technique known as side-channel.
It is definitely a major vulnerability, but one that is not that easy to replicate in the wild.
The reading itself, and the process of cloning the machine, only takes a few minutes.
This isnt something your average hacker could abuse, but a nation-state - absolutely.
ViaArs Technica