top | item 46267426

(no title)

mshroyer | 2 months ago

Not a perfect defense, but sufficient to make your key much harder to exploit: Use a Yubikey (or similar) resident SSH key, with the Yubikey configured to require a touch for each authentication request.

discuss

order

No comments yet.