On 21 June 2015 at 01:55, Ted Roche <[email protected]> wrote: > And how do you review the source code for the firmware in a UbiKey?
Ah, it's actually called YubiKey :-) It shouldn't be necessary as it uses a standard algorithm. It's something you have that the hacker does not. Of course NSA/GCHQ/etc could have introduced weaknesses into the algo. (As they've been caught doing in the past). -- Paul _______________________________________________ Post Messages to: [email protected] Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech Searchable Archive: http://leafe.com/archives/search/profox This message: http://leafe.com/archives/byMID/profox/CADwx0+L22STGoKaqfKW=O6hn5osWhnsBCF6jK=h9zqo9me5...@mail.gmail.com ** All postings, unless explicitly stated otherwise, are the opinions of the author, and do not constitute legal or medical advice. This statement is added to the messages for those lawyers who are too stupid to see the obvious.

