EUCLEAK attack
EUCLEAK attack
Posted Sep 4, 2024 21:56 UTC (Wed) by geuder (subscriber, #62854)In reply to: EUCLEAK attack by hmh
Parent article: Firefox 130.0 released
I agree. Really understanding the 80+ pages is probably impossible for 99.9% of the readers including myself. But I found it rather accessible to read anyway.
They also say clearly in the beginning: It's safer to use an affected Yubikey than not to use it because of their discovery.
Unless you are Julian Assange, Edward Snowden, or someone with similarly powerful adversary there is nothing to be worried about even after this attack.
Posted Sep 5, 2024 10:01 UTC (Thu)
by farnz (subscriber, #17727)
[Link] (2 responses)
Specifically, for the EUCLEAK attack to be of concern to you, the attacker needs to be able to do the following without getting caught:
Steps 1, 3 and 5 are all hard to do without leaving traces, unless you've got powerful backers, and for most of us, the work involved in doing those steps is not worth the gain (access to accounts protected by Yubikey + password).
Posted Sep 5, 2024 11:49 UTC (Thu)
by excors (subscriber, #95769)
[Link] (1 responses)
Posted Sep 5, 2024 13:14 UTC (Thu)
by farnz (subscriber, #17727)
[Link]
Indeed - and one of the consequences of that is that the attack is only relevant where the attacker has the capability to do a complex process taking about an hour and with risk of getting caught in order to clone your Yubikey, but does not have the capability to take your Yubikey and keep you from noticing that they've done so (e.g. because they've got you in a jail cell) until they've finished extracting everything of value from your accounts.
Doesn't stop it being a cool piece of research, and something we should aim to defend ourselves against in the long run; does mean that it's of limited practical relevance.
EUCLEAK attack
EUCLEAK attack
EUCLEAK attack