I noticed that with Linux pam-u2f module whether you are required to input your PIN can be changed by simply editing ~/.config/Yubico/u2f_keys file and either adding +pin to your configuration line or removing it from there. This lead me to wonder if it is also possible to bypass PIN requirement of LUKS device protected by FIDO token (enrolled with systemd-cryptenroll --fido2-device=auto --fido2-with-client-pin=yes /dev/DEVICE) with some hex editor magic?
According to my rudimentary experimentation this is not possible, however what I would like to understand is why this (probably?) is not possible. What is really happening under the hood?