Can Security Keys Be Uniquely Identified?!


This is a companion discussion topic for the original entry at https://www.youtube.com/watch?v=W2jazHYBWwA