minus-squareIronJumbo68@lemmy.worldOPtoLinux@lemmy.world•SSH backdoor infectionlinkfedilinkEnglisharrow-up2·2 months agoIn that case, it seems to me that the only threat is the mindless copying of public keys to other servers, as described in the article. But who does so? Do admins not create separate private-public keys for each server? Thank you for the explanation! linkfedilink
IronJumbo68@lemmy.world to Proton @lemmy.worldEnglish · 2 months agoWhy Google (FCM) notifications on Android are dangerousplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWhy Google (FCM) notifications on Android are dangerousplus-squareIronJumbo68@lemmy.world to Proton @lemmy.worldEnglish · 2 months agomessage-square0fedilink
IronJumbo68@lemmy.world to Linux@lemmy.worldEnglish · 2 months agoSSH backdoor infectionplus-squaremessage-squaremessage-square6fedilinkarrow-up18arrow-down12
arrow-up16arrow-down1message-squareSSH backdoor infectionplus-squareIronJumbo68@lemmy.world to Linux@lemmy.worldEnglish · 2 months agomessage-square6fedilink
IronJumbo68@lemmy.world to Proton @lemmy.worldEnglish · 2 months agoRisk of security of emails in HTML formatplus-squarelutrasecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRisk of security of emails in HTML formatplus-squarelutrasecurity.comIronJumbo68@lemmy.world to Proton @lemmy.worldEnglish · 2 months agomessage-square0fedilink
In that case, it seems to me that the only threat is the mindless copying of public keys to other servers, as described in the article. But who does so? Do admins not create separate private-public keys for each server?
Thank you for the explanation!