Note that, if yubico ever gave you the ability to do such a thing (and I doubt they would), the attestation certificate would be void. Some sites, like banking websites, will likely balk at using a U2F key with a self-signed (or totally bogus even) attestation certificate. They could theoretically allow you to wipe the "device master secret" and generate a new key in the secure element, but someone could tamper with the device during this process to lower the entropy of the resulting key (glitching, etc), so I doubt they would ever do that, either --- at least not for their consumer-oriented products.
That being said, Yubico should probably elaborate on how the U2F "device master secret" is generated. Is it generated in the secure element when the device first starts up (which has pros and cons, but as long as the on-chip RNG is verified as operating properly then it should be ideal)? Or is it generated by a computer on the assembly line and loaded onto the device(Less ideal because yubico
could theoretically be storing the keys without our knowledge)?
Keep in mind that the only identifying information in the registration info is which batch the key came from, so someone would have to have *all* of the security key "device master secrets" for that particular batch in order to be able to identify which secret is associated with some random registration info. This doesn't seem like an easy attack vector unless Yubico is a total push-over, which I find doubtful.
It is absolutely in yubico's best interest to not have any physical access to the "device master secret" in their U2F security keys. They are too much of a liability to the company's reputation.
Also, read this post for more info:
https://www.yubico.com/2014/11/yubicos- ... -wrapping/