Google Recalls Its Bluetooth Titan Security Keys Because of a Security Bug (techcrunch.com) 21
Google today disclosed a security bug in its Bluetooth Titan Security Key that could allow an attacker in close physical proximity to circumvent the security the key is supposed to provide. From a report: The company says that the bug is due to a "misconfiguration in the Titan Security Keys' Bluetooth pairing protocols" and that even the faulty keys still protect against phishing attacks. Still, the company is providing a free replacement key to all existing users. The bug affects all Titan Bluetooth keys, which sell for $50 in a package that also includes a standard USB/NFC key, that have a "T1" or "T2" on the back.
Guess Yubico was right (Score:4, Interesting)
Re:Guess Yubico was right (Score:4, Interesting)
I have a USB-C Yubikey 5. No wireless.
I suggested no electronic voting machine can possibly provide security if it has a wireless networking capability of any kind--the hardware needs to not be there. Controlling the state of the machine and proving it to the public at the time of polling is doable...but hackers can invisibly bypass that if you plug it into networks. Wireless is always plugged in.
Before this flaw was known, it existed. Hackers could have exploited this flaw. We don't know.
Wireless communication is an inappropriate feature for the type of security these devices are supposed to provide.
Re: (Score:3)
I believe the Bluetooth keys were necessary to support iPhones because, until recently, Apple would not allow third-parties to access the NFC. At this point, I believe that only Yubikey has permission to do so.
Re: (Score:2)
Let's do it better than ubikey (Score:3)
T1 or T2? (Score:5, Funny)
Upon shoving my Titan Bluetooth key in a padded enveloppe to send it back to Google, I swear I heard it say "I'll be back".
Yes (Score:2)
See Feitian's page [ftsafe.com] for replacement details.