| ▲ | convolvatron a day ago | |||||||||||||
apologies for asking this question here instead of actually doing the research, but it always seemed to be that while putting keys in a secure environment would help against leakage of the private bits, there really isn't a great story around making sure than only authorized requests can be signed. is this a stupid concern? | ||||||||||||||
| ▲ | justincormack a day ago | parent | next [-] | |||||||||||||
Yubikey can require touch, and Secretive for Apple Secure enclave can require touch with fingerprint id. Some people disable these, it depends exactly on your use case. | ||||||||||||||
| ||||||||||||||
| ▲ | guipsp a day ago | parent | prev [-] | |||||||||||||
It is not a stupid concern, butt there is architecture around making sure you can't just save a request for later and replay it | ||||||||||||||