Additional Resources:
YubiKey 5, a popular two-factor authentication device, has been found to have a security vulnerability. In this video I explain how this flaw allows attackers to clone the device if they can get physical access to it.
The EUCLEAK write up and paper
Connect With Us
- Hire Us for a project: Hire Us – Lawrence Systems
- Toms’ Twitter x.com
- Our Website https://www.lawrencesystems.com/
- Our Forums https://forums.lawrencesystems.com/
- Instagram Lawrence Technology Services (@lawrencesystems) • Instagram profile
- Facebook Lawrence Systems | Southgate MI
- GitHub lawrencesystems (Lawrence Systems) · GitHub
- Discord Lawrence Systems
Lawrence Systems Shirts and Swag
AFFILIATES & REFERRAL LINKS
Amazon Affiliate Store
Lawrence Systems's Amazon Page
UniFi Affiliate Link
Ubiquiti Store
All Of Our Affiliates help us out and can get you discounts!
Partners We Love – Lawrence Systems
Gear we use on Kit
Kit
Use OfferCode LTSERVICES to get 10% off your order at
Tech Supply Direct - Premium Refurbished Servers & Workstations at Unbeatable Prices
Digital Ocean Offer Code
DigitalOcean | Cloud Infrastructure for Developers
HostiFi UniFi Cloud Hosting Service
HostiFi - Launch UniFi, UISP and Omada in the Cloud
Protect your privacy with a VPN from Private Internet Access
Buy VPN with Credit Card or PayPal | Private Internet Access
Patreon
https://www.patreon.com/lawrencesystems
Chapters
00:00 Is Your Yubikey Still Secure
01:00 What is a Yubikey?
01:32 How the attack works
01:47 Why EUCLEAK?
02:40 More Than Yubkiey