On 29 May 2012 01:35, Peter Gutmann wrote:
> Peter Maxwell writes:
>
> >Why on earth would you need to spread your private-key across any number
> of
> >less secure machines?
>
> The technical details are long and tedious (a pile of machines that need to
> talk via SSH because telnet and FTP wer
On May 26, 2012, at 8:15 34AM, Eugen Leitl wrote:
> On Fri, May 25, 2012 at 11:19:33AM -0700, Jon Callas wrote:
>
>> My money would be on a combination of traffic analysis and targeted
>> malware. We know that the Germans have been pioneering using targeted malware
>> against Skype. Once you've
Peter Maxwell writes:
>Why on earth would you need to spread your private-key across any number of
>less secure machines?
The technical details are long and tedious (a pile of machines that need to
talk via SSH because telnet and FTP were turned off/firewalled years ago, I
won't bore you with th
* Marcus Brinkmann:
> As far as decryption capabilities goes, the text is very clear: The
> software used to analyse the communication stream can, in principle,
> decrypt and/or analyze at least some of it. Note the qualifiers: In
> principle, decrypt and/or analysis, depending on type and qualit
Peter Gutmann wrote:
Werner Koch writes:
Which is not a surprise given that many SSH users believe that ssh
automagically make their root account save and continue to use their lame
passwords instead of using PK based authentication.
That has its own problems with magical thinking: Provided