
Sign up to save your podcasts
Or


Insecure SSH implementations and a weak key that let a researcher control 200 MW of electrical capacity reignites the debate about versioned protocols vs pluggable protocols, follow-up on sharing files from your LAN with people on the Internet, and the pros and cons of encrypted backups.
Plug
Support us on patreon and get an ad-free RSS feed with early episodes sometimes
News/discussion
Researchers find insecure SSH implementations everywhere
512-bit RSA key in home energy system gives control of “virtual power plant”
Feedback
Syncthing
Resilio
Send
OnionShare
Warp
Immich
Free consulting
We were asked about the pros and cons of encrypted backups.
1Password
Extended Access Management: Secure every sign-in for every app on every device. Support the show and check it out at 1password.com/25a
See our contact page for ways to get in touch.
By The Late Night Linux Family4.7
9696 ratings
Insecure SSH implementations and a weak key that let a researcher control 200 MW of electrical capacity reignites the debate about versioned protocols vs pluggable protocols, follow-up on sharing files from your LAN with people on the Internet, and the pros and cons of encrypted backups.
Plug
Support us on patreon and get an ad-free RSS feed with early episodes sometimes
News/discussion
Researchers find insecure SSH implementations everywhere
512-bit RSA key in home energy system gives control of “virtual power plant”
Feedback
Syncthing
Resilio
Send
OnionShare
Warp
Immich
Free consulting
We were asked about the pros and cons of encrypted backups.
1Password
Extended Access Management: Secure every sign-in for every app on every device. Support the show and check it out at 1password.com/25a
See our contact page for ways to get in touch.

289 Listeners

152 Listeners

887 Listeners

268 Listeners

164 Listeners

89 Listeners

36 Listeners

45 Listeners

22 Listeners

6 Listeners

29 Listeners

63 Listeners

22 Listeners

3 Listeners

1 Listeners