Hacked: SSH Based Security.
Security, or the process of attempting to protect computers is an imprecise science at best. How do you secure SSH?
- Strength: Difficult to break
- Weakness: Carrying Keys Around
- Strength: Less passwords
- Strength: Can be used instead of passwords for many services.
- Weakness: You can catch auth-sessions, then run cracking against the token.
- Weakness: Still based on password strength
So, we are left at a small impasse.
- Ubituitous Remote Access