Isn’t the above required to really protect the keys?
The main design objective with the YubiHSM is to protect keys from remote attacks. With that said, it is still non-trivial to retrieve keys from a YubiHSM even if it is stolen or physcially compromised.
Posted in: 8. YubiHSM