top | item 37796664 (no title) elesiuta | 2 years ago I think this is still reasonable, attackers may have a database of leaked keys (e.g. if you ever accidentally commited to GitHub, or ever ran a malicious script which uploaded it), which they then try on random servers. discuss order hn newest No comments yet.
No comments yet.