Yes, I see that in this instance there is a bootstrap problem with using OTP for captcha.
Also, after the AES key is replaced with a non-factory one, presumably Yubico can no longer vouch that the OTPs were made by hardware? And therefore it's open to flooding from multiple ids, in software.
On U2F, I wondered if it is better value for captcha. Older keys don't have it, so maybe it's not good for OTP AES key replacement. But it can be verified as hardware even by third parties, so maybe it's useful for blog posts?
ChrisHalos wrote:
For some reason, a decent amount of customers receive their YubiKey and decide it's a good idea to wipe the default credential in slot 1 and
If I were doing that, it could be either ineptness or some ill-defined fear of other people's secrets. Or I just needed two slots for a while..? (I'm n00b)