USBArmory talk from 31C3. http://media.ccc.de/browse/congress/2014/31c3_-_6541_-_en_-_saal_2_-_201412281730_-_forging_the_usb_armory_-_andrea_barisani.html#video&t=328 … Using SSH fingerprints to authenticate the host = Obviously susceptible to MITM!
@OwariDa but I'm interested in your attack scenario, email me if you like
-
-
@AndreaBarisani Ok, I'll do that. Easier than using 140 chars for each message. :)Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.