aboutsummaryrefslogtreecommitdiffstatshomepage
diff options
context:
space:
mode:
authordrduh <github@duh.to>2019-06-09 17:37:55 +0000
committerGitHub <noreply@github.com>2019-06-09 17:37:55 +0000
commit753b8e7a3bf784c778fd6c3ae7897c6559c2284a (patch)
tree51950bb37f1014e660aa5fb3025af815b76713d6
parentAdd card reset steps, clean up formatting. (diff)
parentFix link to supply chain attacks (diff)
downloadYubiKey-Guide-753b8e7a3bf784c778fd6c3ae7897c6559c2284a.tar.gz
Merge pull request #113 from jakkn/master
Fix link to supply chain attacks
-rw-r--r--README.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/README.md b/README.md
index e4a8b8c..6f764c2 100644
--- a/README.md
+++ b/README.md
@@ -64,7 +64,7 @@ You will also need several small storage devices for booting a live image, creat
To verify a YubiKey is genuine, open a [browser with U2F support](https://support.yubico.com/support/solutions/articles/15000009591-how-to-confirm-your-yubico-device-is-genuine-with-u2f) to [https://www.yubico.com/genuine/](https://www.yubico.com/genuine/). Insert a Yubico device, and select *Verify Device* to begin the process. Touch the YubiKey when prompted, and if asked, allow it to see the make and model of the device. If you see *Verification complete*, the device is authentic.
-This website verifies the YubiKey's device attestation certificates signed by a set of Yubico CAs, and helps mitigate [supply chain attacks](https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf).
+This website verifies the YubiKey's device attestation certificates signed by a set of Yubico CAs, and helps mitigate [supply chain attacks](https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEF%20CON%2025%20-%20r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf).
# Live image