8 points rewant 4 days ago 8 comments
Github:https://github.com/TheEleventhAvatar/Anchor
KomoD 2 days ago | parent
And also do they not get saved in logs like dmesg?
vivid242 1 hour ago | parent
alexpotato 1 hour ago | parent
Was recently watching a video on the RFID tags that Bambu Labs use on their spools and not only is the tag data encrypted, it's signed so even if you bypass the encryption, you still don't have a way to spoof the signature.
vel0city 1 hour ago | parent
One of the whole points of authenticator devices is that the actual key material isn't directly readable. You shouldn't be able to trivially reproduce the device.
maximusdrex 1 hour ago | parent
This is so, so much worse than that though, because the code doesn't even do what the AI-hallucinated documentation describes, because as far as I can tell the actual "serial number" is returned by the following line: Ok(Some(format!("{:?}", device.product_id()))) So the "serial number" is actually the USB product id, which generally corresponds to the "model", not even unique per-device. So you didn't even test this with multiple identical flash drives.
follie 1 hour ago | parent
Vexs 1 hour ago | parent
ImPostingOnHN 1 hour ago | parent
This is normal to do for yubikeys, for example.
The main point is that the secrets stored on the device are usually used to unlock other secrets stored elsewhere, and so themselves don't need to be synchronized often.