USBArmory talk from 31C3. http://media.ccc.de/browse/congress/2014/31c3_-_6541_-_en_-_saal_2_-_201412281730_-_forging_the_usb_armory_-_andrea_barisani.html#video&t=328 … Using SSH fingerprints to authenticate the host = Obviously susceptible to MITM!
-
-
Replying to @AndreaBarisani
@AndreaBarisani Yes, it works in the context of SSH, but not in the USBArmory scenario when the device just wants to verify the host.1 reply 0 retweets 0 likes -
Replying to @AndreaBarisani
@AndreaBarisani Yes, but will all subsequent interaction with the host be performed over SSH as well?3 replies 0 retweets 0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.