When it comes to user authentication, there are many options available, from passwords at the weaker end of the security spectrum to hardware keys at the other. But what if the hardware security key ...
I've now spent a significant amount of effort exploring the ways to use yubikeys that extend beyond the basic web authentication. These are incredibly capable devices but you have to know what you're ...