Remove talk attacking-encrypted-usb-keys-the-hardware-way
article thumbnail

From U2F to passkeys

Imperial Violet

They picked up a lot of complexity on the way, and this post tries to give a chronological account of the development of the core of these technologies. It was a pair of standards, one for computers to talk to small removable devices called security keys, and the second a JavaScript API for websites to use them.

article thumbnail

Security Keys

Imperial Violet

Security Keys are another attempt address this problem—initially in the form of a second authentication factor but, in the future, potentially as a complete replacement. Security Keys are another attempt address this problem—initially in the form of a second authentication factor but, in the future, potentially as a complete replacement.

Security 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: So You Want To Be A Pentester

ForAllSecure

In this episode of The Hacker Mind, Kim talks about the practical steps anyone can take to gain the skills and confidence necessary to become a successful pentester -- from gaining certifications, to building a lab, to participating in bug bounties and even CTFs. Often when I talk to people about pentesting, it’s the same problem.

article thumbnail

The Hacker Mind Podcast: So You Want To Be A Pentester

ForAllSecure

In this episode of The Hacker Mind, Kim talks about the practical steps anyone can take to gain the skills and confidence necessary to become a successful pentester -- from gaining certifications, to building a lab, to participating in bug bounties and even CTFs. Often when I talk to people about pentesting, it’s the same problem.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

After hearing a talk, a Dallas-based hacker set out to find out what was going on inside the smart meter attached to his home, and what he found was surprising. He joins The Hacker Mind to talk about his journey, about mesh networks, and even glitching. Like any true hacker, this isn’t his day job; this is his passion.