this post was submitted on 14 Nov 2023
51 points (100.0% liked)

cybersecurity

3249 readers
4 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 1 year ago
MODERATORS
 

I read most of this article trying to determine if I was impacted, so to save you the trouble:

The researchers traced the keys they compromised to devices that used custom, closed-source SSH implementations that didn’t implement the countermeasures found in OpenSSH and other widely used open source code libraries.

you are viewing a single comment's thread
view the rest of the comments
[–] BestBouclettes@jlai.lu 1 points 1 year ago

I migrated most of my keys to ed25519 a while ago, I probably should keep going