A simple step-by-step tutorial to add Yubikey 2FA to your Vanguard account that will protect your investments from hackers & phishing.| All Things Secured
Step-by-step tutorial to add Yubikey 2FA to your iCloud account. Prevent phishing and protect your Apple iPhone, iPad, or Mac.| All Things Secured
I’d like to describe and discuss a threat model for computational devices. This is generic but we will narrow it down to security-related devices. For example, portable hardware dongles used for OpenPGP/OpenSSH keys, FIDO/U2F, OATH HOTP/TOTP, PIV, payment cards, wallets Continue reading A Security Device Threat Model: The Substitution Attack→| Simon Josefsson's blog