Quote from: Keith Smith on September 04, 2024, 20:09:29"Scientists in lab, figure out a way to duplicate a U2F key with a great deal of effort"
Not
"Vulnerability breaks the security" of anything
This is so disingenuous it's not even funny. Once I hand you my u2f device we are kinda way past the security angle. This may come as a shock to you but if you lose your house key someone can duplicate it, if it was stamped with your address maybe it's time to change the locks. So do you think someone is going to go all "Mission Impossible" on you, "borrow" your yubi-key for a few hours, rip it apart, then using sophisticated equipment clone it, then glue it back together and give it back to you so you never know. If so you watch too much TV or too many movies.
Reading a few stories of what Equation Group has managed to do, and other state actors, it is of a considerable concern, for some, to know such details. For the vast majority of people, you are correct. Most people using yubikeys or similar technologies constantly might be privileged to certain type of confidential / controlled information. Some even more so. Some of those still... might potentially have the sort of secrets a state actor would want to acquire. That's the thing. If you're a nobody you're safe. If you're someone that could be targeted by elites... this is cause for concern.
And as someone mentioned "the probe requires complete disassembly" it was placed right up against the small processor. In theory, a state actor could develop a way that is less intrusive and obvious, such as creating a hidden device that will be in close enough proximity to the 2FA physical key for long enough, that boosts sensitivity to be able to detect and record these signals. Who knows, perhaps you could have it be in a hotel safe hole and there's extra space for this intercepting signal analyser. Someone goes to bed and puts their physical key in the safe before bed... and while they sleep, their key is being analysed. Who knows how sensitive a probe needs to be. Who knows how much the process could be shortened etc. Heck, even the fact that your key could be taken and cloned and returned to you, by these state actors, without your knowledge is enough of a concern for certain special individuals.
Was the security of the key already important? Absolutely. But now you're adding another risk: compromised 2FA. Someone in theory could duplicate a 2FA method and use that for unauthorised access. So you almost have to keep multiple backups but if anything happens to the backups you keep trashing them. Or something.