this post was submitted on 08 May 2026
166 points (95.6% liked)

Cybersecurity

9939 readers
155 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] fascicle@leminal.space 2 points 1 day ago (2 children)

Don't they just spit out the long password when you press them, I'd figure it would be easy to just plug it into your phone and copy the output if you had physical access

[–] med@sh.itjust.works 2 points 22 hours ago

It's OTP. Once a code has been seen, all the previous ones no longer work. There's no point in copying.

There's a second slot that can be used for static passwords. But don't, obviously.

[–] tgxn@lemmy.tgxn.net 4 points 1 day ago

That is but one method of Yubikey. They also support cryptographic passkeys and can store TOTP secrets as well as PGP crypto keys.

The "touch key random key" is a OTP code that can be used for legacy software, Passkey and/or other functions are more valuable to me. Can read more about OTP security here.