top | item 46267426 (no title) mshroyer | 2 months ago Not a perfect defense, but sufficient to make your key much harder to exploit: Use a Yubikey (or similar) resident SSH key, with the Yubikey configured to require a touch for each authentication request. discuss order hn newest No comments yet.
No comments yet.