Hacker News new | past | comments | ask | show | jobs | submit login

Best not rely on any security once attackers have access to your physical system. Someone could even take your computer, install a keylogger, and get it back to you.

If you have a Mac and secure your SSH keys with Keychain someone could take it, crack it open, freeze your memory, and dump it.

Two factor is definitely the best you could do on this front but who sets up two factor with SSH?




it's simple with yubikeys




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: