So, the problem with USB tokens that we basically have two choices: - Unauditable black boxes built on *supposedly* more secure ICs that require NDAs to develop for - Open and auditable, but definitely pwnable off the shelf microcontrollers. Which poison do you prefer?
-
Show this thread
-
This Tweet is unavailable.
-
This Tweet is unavailable.
Replying to @videah_
The use case for a lot of these keys is to leave them plugged in to specific machines, which you may be away from.
1:45 AM - 12 Mar 2020
0 replies
0 retweets
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.