(no title)
singlow | 6 months ago
Not that this is a bad thing, but first start using keys, then start rotating them regularly and then worry about theoretical future attacks.
singlow | 6 months ago
Not that this is a bad thing, but first start using keys, then start rotating them regularly and then worry about theoretical future attacks.
djmdjm|6 months ago
A captured SSH session should never be able to decrypted by an adversary regardless of whether it uses passwords or keys, or how weak the password is.