Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Think of it as of an advanced yubikey.

A cheap Android phone is pretty much the opposite of a Yubikey, in terms of trusted computing base and attack surface.





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: