On 21 June 2015 at 01:55, Ted Roche <[email protected]> wrote:
> And how do you review the source code for the firmware in a UbiKey?

Ah, it's actually called YubiKey :-)
It shouldn't be necessary as it uses a standard algorithm.

It's something you have that the hacker does not.

Of course NSA/GCHQ/etc could have introduced weaknesses into the algo.
(As they've been caught doing in the past).

-- 
Paul

_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox
OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/CADwx0+L22STGoKaqfKW=O6hn5osWhnsBCF6jK=h9zqo9me5...@mail.gmail.com
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to