So, the problem with USB tokens that we basically have two choices: - Unauditable black boxes built on *supposedly* more secure ICs that require NDAs to develop for - Open and auditable, but definitely pwnable off the shelf microcontrollers. Which poison do you prefer?
-
-
possibly, or a supercap w/ ultra-low power sram for seed material - or possibly flash memory encrypted with some PBKDF function over the PIN code + a random data in the OTP-rom in the micro.
-
or maybe even use a standard proprietary smart card chip via standard interfaces for decrypting seed/configuration data so that you can take advantage of their "hardened" properties without their software contaminating yours?
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.