1 comment

3

I don't even know how to react apropriately to the SSH thing, this is like a death sentence to secure system administration. There are not many details yet on how it works and it looks like it's no 100% solution, but they seem to be able to read SSH connections with a certain probability.

Here are the documents referenced in the talk