Replies: 2 comments 1 reply
-
|
Beta Was this translation helpful? Give feedback.
1 reply
-
All the vulnerabilities put in common the fact that a physical access and a manipulation is needed. If you loose your device or it stolen, then you must assume your keys have been exposed and should be revoked as soon as possible. Therefore, you must keep your device with you all the time. You cannot leave it unattended. If you have your device with you all time, then your keys are safe, at least at the present. I didn't measure or compare the time with other keys but the response is fast, at least for the price you are paying. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Thanks for a very relevant project!
I have a few concerns about the hardware.
Beta Was this translation helpful? Give feedback.
All reactions