On Fri, May 16, 2025 at 09:02:03PM +0000, fxkl4...@protonmail.com wrote: > On Fri, 16 May 2025, to...@tuxteam.de wrote:
[...] > thanks You are welcome :-) > i understand the no host hash in an industrial setting > but in a home network it seems unnecessary Well -- there are mixed cases. In my case, my laptop is my laptop. I use it to log in into many a customer's box and fix things. Of course, the harddisk is encrypted, but if someone finds an exploit while my box is running, I'd like them to find as little help as possible to hack my customers. If you watch how exploits usually go, you'll see that many move from one weakness to the next, until reaching their goal. That's why the concept of "defense in depth" [1] makes sense in our context. Cheers [1] https://en.wikipedia.org/wiki/Defense_in_depth_(computing) -- tomás
signature.asc
Description: PGP signature