lemmyreader@lemmy.ml to Technology@lemmy.mlEnglish · 8 months agoPasskeys: A Shattered Dreamfy.blackhats.net.auexternal-linkmessage-square51fedilinkarrow-up193arrow-down112cross-posted to: cybersecurity@sh.itjust.workshackernews@lemmy.smeargle.fanstechnology@lemmy.worldsecurity@lemmy.ml
arrow-up181arrow-down1external-linkPasskeys: A Shattered Dreamfy.blackhats.net.aulemmyreader@lemmy.ml to Technology@lemmy.mlEnglish · 8 months agomessage-square51fedilinkcross-posted to: cybersecurity@sh.itjust.workshackernews@lemmy.smeargle.fanstechnology@lemmy.worldsecurity@lemmy.ml
minus-squarejetAlinkfedilinkEnglisharrow-up3·8 months agoThat is a reasonable use case for software keys, maybe the sweet spot is using a hardware key to lock your software keys.
That is a reasonable use case for software keys, maybe the sweet spot is using a hardware key to lock your software keys.