On Fri, May 16, 2025 at 09:02:03PM +0000, fxkl4...@protonmail.com wrote:
> On Fri, 16 May 2025, to...@tuxteam.de wrote:

[...]

> thanks

You are welcome :-)

> i understand the no host hash in an industrial setting
> but in a home network it seems unnecessary

Well -- there are mixed cases. In my case, my laptop is
my laptop. I use it to log in into many a customer's box
and fix things.

Of course, the harddisk is encrypted, but if someone finds
an exploit while my box is running, I'd like them to find
as little help as possible to hack my customers.

If you watch how exploits usually go, you'll see that many
move from one weakness to the next, until reaching their goal.

That's why the concept of "defense in depth" [1]  makes sense
in our context.

Cheers

[1] https://en.wikipedia.org/wiki/Defense_in_depth_(computing)
-- 
tomás

Attachment: signature.asc
Description: PGP signature

Reply via email to