lemmyreader@lemmy.ml to Technology@lemmy.mlEnglish · 5 months agoPasskeys: A Shattered Dreamfy.blackhats.net.auexternal-linkmessage-square47fedilinkarrow-up11arrow-down10cross-posted to: technology@lemmy.world
arrow-up11arrow-down1external-linkPasskeys: A Shattered Dreamfy.blackhats.net.aulemmyreader@lemmy.ml to Technology@lemmy.mlEnglish · 5 months agomessage-square47fedilinkcross-posted to: technology@lemmy.world
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up0·5 months agoThat is a reasonable use case for software keys, maybe the sweet spot is using a hardware key to lock your software keys.
That is a reasonable use case for software keys, maybe the sweet spot is using a hardware key to lock your software keys.