Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Those are completely disjoint threats.

A captured SSH session should never be able to decrypted by an adversary regardless of whether it uses passwords or keys, or how weak the password is.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: