I read most of this article trying to determine if I was impacted, so to save you the trouble:
The researchers traced the keys they compromised to devices that used custom, closed-source SSH implementations that didn’t implement the countermeasures found in OpenSSH and other widely used open source code libraries.
You must log in or register to comment.
You da real mvp