USBArmory talk from 31C3. http://media.ccc.de/browse/congress/2014/31c3_-_6541_-_en_-_saal_2_-_201412281730_-_forging_the_usb_armory_-_andrea_barisani.html#video&t=328 … Using SSH fingerprints to authenticate the host = Obviously susceptible to MITM!
@OwariDa followup over email, I much prefer constructive dcomments/questions rather than criticism about something we have yet to develop ;)
-
-
@AndreaBarisani E-mail sent now. :) Btw, the USBArmory concept itself is absolutely awesome, my critique is supposed to be constructive. -
@OwariDa thanks! And I do much appreciate the feedback.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.