"The researchers traced the keys they compromised to devices that used custom, closed-source SSH implementations that didn’t implement the countermeasures found in OpenSSH and other widely used open source code libraries." Why am I not surprised.

nostr:nevent1qqs2780yq59thnlx72c7a2659u0pvvjgvjam0h26xttwa9hhqz8azmcpp4mhxue69uhkummn9ekx7mqzyr70wzj9e75p064gzwum4z3ht4cn6vtf7j3870w2c02fzyklvlfhuqcyqqqqqqg6nysn6

Reply to this note

Please Login to reply.

Discussion

No replies yet.