USBArmory talk from 31C3. http://media.ccc.de/browse/congress/2014/31c3_-_6541_-_en_-_saal_2_-_201412281730_-_forging_the_usb_armory_-_andrea_barisani.html#video&t=328 … Using SSH fingerprints to authenticate the host = Obviously susceptible to MITM!
@OwariDa protection is to ensure your own laptop is connected, subsequent interactions will have their own authentication mechanisms
-
-
@AndreaBarisani If the real host is reachable on a public IP, one could just proxy the connection to that host. Don't you see the problem? -
@OwariDa followup over email, I much prefer constructive dcomments/questions rather than criticism about something we have yet to develop ;) -
@AndreaBarisani E-mail sent now. :) Btw, the USBArmory concept itself is absolutely awesome, my critique is supposed to be constructive. -
@OwariDa thanks! And I do much appreciate the feedback.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.