2.5 Admins 209: Faulty Defaults

Insecure SSH implementations and a weak key that let a researcher control 200 MW of electrical capacity reignites the debate about versioned protocols vs pluggable protocols, follow-up on sharing files from your LAN with people on the Internet, and the pros and cons of encrypted backups.

 

Plug

Support us on patreon and get an ad-free RSS feed with early episodes sometimes

 

News/discussion

Researchers find insecure SSH implementations everywhere

512-bit RSA key in home energy system gives control of “virtual power plant”

 

Feedback

Syncthing

Resilio

Send

OnionShare

Warp

Immich

 

Free consulting

We were asked about the pros and cons of encrypted backups.

 

 

 

 

 

 

1Password

Extended Access Management: Secure every sign-in for every app on every device. Support the show and check it out at 1password.com/25a

 

 

 

 

 

See our contact page for ways to get in touch.