So, the problem with USB tokens that we basically have two choices: - Unauditable black boxes built on *supposedly* more secure ICs that require NDAs to develop for - Open and auditable, but definitely pwnable off the shelf microcontrollers. Which poison do you prefer?
-
-
Are you sure #1 is not vulnerable to physical attacks?
-
No, it just ostensibly tries harder than #2. I honestly have no idea why absolutely no secure element vendor has tried opening up their docs. It's ridiculous.
- Show replies
New conversation -
-
-
What's interesting with #2 is once you have the software right and solid, you can move on fixing the hardware while still being open and once you get #3: secure ("good enough") open hardware & secure ("good enough") open software, I don't believe it's absurd
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I'd say of you are shifting from passwords to a better solution then physical attack is still out of scope Well that's my position & why I'm writing my own FLOSS SQRL token code implementation Though I will give a nod towards encryption at rest & a signed boot chain
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.