Isn’t the above required to really protect the keys?

The main design objective with the YubiHSM is to protect keys from remote attacks. With that said, it is still non-trivial to retrieve keys from a YubiHSM even if it is stolen or physcially compromised.

Posted in: 8. YubiHSM