boem@lemmy.world to Technology@lemmy.worldEnglish · 1 year agoIn a first, cryptographic keys protecting SSH connections stolen in new attackarstechnica.comexternal-linkmessage-square6fedilinkarrow-up1199arrow-down13cross-posted to: cybersecurity@infosec.pubtech@pawb.social
arrow-up1196arrow-down1external-linkIn a first, cryptographic keys protecting SSH connections stolen in new attackarstechnica.comboem@lemmy.world to Technology@lemmy.worldEnglish · 1 year agomessage-square6fedilinkcross-posted to: cybersecurity@infosec.pubtech@pawb.social
minus-squaredeafboy@lemmy.worldlinkfedilinkEnglisharrow-up1·1 year agoSecurity of a sufficiently long RSA key was the one true constant in my life. Poof… There it goes! Once attackers have possession of the secret key through passive observation of traffic, they can mount an active Mallory-in-the-middle Mallory in the middle would be a sick punkrock band name though.
Security of a sufficiently long RSA key was the one true constant in my life. Poof… There it goes!
Mallory in the middle would be a sick punkrock band name though.