Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

A well resourced attacker could manufacture a replacement backdoored key with your ECDSA key.


A small advantage to this attack is they don't need their own manufacturing and can attack keys which are already in use.

A supply chain attack of "here a pre-backdoored key I'm pretending it's perfectly secure, go use it" has no need for this exploit if you have manufacturing capability.

If you don't, then intercepting new yubikeys in transit, extracting the key, and sending them along the way would also be doable with the exploit described.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: