boem@lemmy.world to Technology@lemmy.worldEnglish · 1 year agoIn a first, cryptographic keys protecting SSH connections stolen in new attackarstechnica.comexternal-linkmessage-square6fedilinkarrow-up1199arrow-down14cross-posted to: [email protected][email protected][email protected][email protected][email protected][email protected]
arrow-up1195arrow-down1external-linkIn a first, cryptographic keys protecting SSH connections stolen in new attackarstechnica.comboem@lemmy.world to Technology@lemmy.worldEnglish · 1 year agomessage-square6fedilinkcross-posted to: [email protected][email protected][email protected][email protected][email protected][email protected]
minus-squaredeafboy@lemmy.worldlinkfedilinkEnglisharrow-up1·1 year agoSecurity of a sufficiently long RSA key was the one true constant in my life. Poof… There it goes! Once attackers have possession of the secret key through passive observation of traffic, they can mount an active Mallory-in-the-middle Mallory in the middle would be a sick punkrock band name though.
Security of a sufficiently long RSA key was the one true constant in my life. Poof… There it goes!
Mallory in the middle would be a sick punkrock band name though.