Hacker News new | past | comments | ask | show | jobs | submit login

From the README.md:

> Some people may decide the attack scenario above is worth the usability tradeoff of hardware key storage. But, for many, the security of software-based U2F is sufficient and helps to mitigate against many common attacks such as password dumps, brute force attacks, and phishing related exploits.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: