• PowerCrazy@lemmy.ml
    link
    fedilink
    arrow-up
    1
    arrow-down
    2
    ·
    1 year ago

    Why? There is absolutely zero risk in SSHing into “random” machines especially since I’m using public ssh-keys. Of course the first time I connect to a machine it’s going to be untrusted, but who cares? I’m using SSH to ensure others can’t sniff my traffic.

    • ToxicWaste@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      If i want to sniff your traffic, ill set up another machine as MITM attack.

      I guess as long as you stay inside a secure company network, it wouldn’t be that bad. But if you go through the WWW, my advice is to manually add trusted hosts.

      • PowerCrazy@lemmy.ml
        link
        fedilink
        arrow-up
        1
        arrow-down
        4
        ·
        1 year ago

        Setting up a mitm on the internet is a non-trivial task and I’m quite confident you have neither the access, nor the ability to do that. Very few people do. So let’s just say that isn’t an attack vector that anyone should be concerned with.

        • ToxicWaste@lemm.ee
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          Everyone who can read your unencrypted traffic has the possibility to intercept your encrypted stuff. So it is really not that hard.

          But you don’t seem to be bothered too much about that possibility. So lets agree to disagree.