Joanna Rutkowska @rootkovska
If the UI layer is compromised, everything can be proxied anyway (including HSM/U2F)... (This is because the user'… https://t.co/SgMUd5VvR8 — PolitiTweet.org
Shane Huntley @ShaneHuntley
@lorenzoFB @hillbrad I still think almost no-one is emphasizing (or even gets) how much more secure security keys a… https://t.co/VomrIKdarZ