<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=35&amp;t=2589" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2017-03-04T00:26:05+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=35&amp;t=2589</id>
<entry>
<author><name><![CDATA[jucoin]]></name></author>
<updated>2017-03-04T00:26:05+01:00</updated>
<published>2017-03-04T00:26:05+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2589&amp;p=9442#p9442</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2589&amp;p=9442#p9442"/>
<title type="html"><![CDATA[distinguish operation requested before pressing button]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2589&amp;p=9442#p9442"><![CDATA[
Hello, I'm a new YK users, loving it so far. I'm concerned a bout one potential issue:<br />I'm going to use a Yubikey 4 for TOTP, U2F and PGP. I'm not worried if I leak a token for site A to site B but I'm worried if malware in compromised machine can wait for me to login somewhere and press the button and send a PGP  sign or decrypt operation to the yubikey. I will press the button to authorize the operation because I'm login into a site but the malware will use the opportunity to forge a message for example or authenticate to a remote SSH server.<br /><br />Is there a light pattern or press pattern to avoid this attack? For example press twice or press longer for PGP operations or different light flashing.<br /><br />thank you<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4715">jucoin</a> — Sat Mar 04, 2017 12:26 am</p><hr />
]]></content>
</entry>
</feed>