lemmyreader@lemmy.ml to Technology@lemmy.mlEnglish · 2 years agoPasskeys: A Shattered Dreamfy.blackhats.net.auexternal-linkmessage-square50fedilinkarrow-up193
arrow-up181external-linkPasskeys: A Shattered Dreamfy.blackhats.net.aulemmyreader@lemmy.ml to Technology@lemmy.mlEnglish · 2 years agomessage-square50fedilink
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up3·2 years agoThat is a reasonable use case for software keys, maybe the sweet spot is using a hardware key to lock your software keys.
That is a reasonable use case for software keys, maybe the sweet spot is using a hardware key to lock your software keys.