Given the recent vulnerabilities discovered in yubikey tokens (https://www.yubico.com/support/security-advisories/ysa-2024-03/), why not implement ifod2 authentication independent of a single hardware vendor?