AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
U2f security key aws5/13/2023 ![]() ![]() ![]() Hopefully, since I don’t click or go to links on that phone my attack surface is reduced. What about the attack surface of my phone and the ability to use that to obtain MFA codes? I use a separate phone for my authenticator app on which I don’t use to surf the web or install untrusted applications. Hopefully the attacker never gets access to my laptop but I’d just like to rule out the any possible attack paths until I investigate it further.Īttack Surface on a Phone With Virtual MFA ![]() By installing the Yubico CLI on my laptop, an attacker who somehow obtains access to my laptop can use the commands in that CLI to do whatever that CLI can do. ![]()
0 Comments
Read More
Leave a Reply. |