| ▲ | knorker a day ago | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Without presence test (e.g. yubikeys touch) it's certainly not perfect. But it does close some real world attacks. Like the key can only be used while your laptop is on. (assuming laptop, here). And keys cannot be stolen from backups. Or stolen without your knowledge when you left your laptop unguarded for 5min. Not every attacker has persistent undetected access. If the key can be copied then there's no opportunity for the original machine's tripwires to be triggered by its use. Every second malware runs is a risk of it being detected. Not so, or not in the same way, with a copied key. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | spwa4 a day ago | parent [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
I guess you could implement that on android. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||