Derek Caelin is a user on mastodon.technology. You can follow them or interact with them if you have an account anywhere in the fediverse.
If you don't, you can sign up here.
@Argus I'm no cyber-expert but I'd say it's okay as long as you configure the keys/secrets yourself.
I know some YKs come pre-programmed, either by Yubico (https://www.yubico.com/products/manufacturing/programming-options/) or by your employer (if it's for work purposes). I guess there could be some supply-side key-copying going on; ranging from the malicious to your IT department wanting to retain keys in case you leave the company at some stage.
@Argus I'm no cyber-expert but I'd say it's okay as long as you configure the keys/secrets yourself.
I know some YKs come pre-programmed, either by Yubico (https://www.yubico.com/products/manufacturing/programming-options/) or by your employer (if it's for work purposes). I guess there could be some supply-side key-copying going on; ranging from the malicious to your IT department wanting to retain keys in case you leave the company at some stage.