Discover2.5 Admins2.5 Admins 209: Faulty Defaults
2.5 Admins 209: Faulty Defaults

2.5 Admins 209: Faulty Defaults

Update: 2024-08-22
Share

Description

Insecure SSH implementations and a weak key that let a researcher control 200 MW of electrical capacity reignites the debate about versioned protocols vs pluggable protocols, follow-up on sharing files from your LAN with people on the Internet, and the pros and cons of encrypted backups.


 


Plug


Support us on patreon and get an ad-free RSS feed with early episodes sometimes


 


News/discussion


Researchers find insecure SSH implementations everywhere


512-bit RSA key in home energy system gives control of “virtual power plant”


 


Feedback


Syncthing


Resilio


Send


OnionShare


Warp


Immich


 


Free consulting


We were asked about the pros and cons of encrypted backups.


 


 


 


 


 


 


1Password


Extended Access Management: Secure every sign-in for every app on every device. Support the show and check it out at 1password.com/25a


 


 


 


 





 










See our contact page for ways to get in touch.


 















Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

2.5 Admins 209: Faulty Defaults

2.5 Admins 209: Faulty Defaults

The Late Night Linux Family