#security Articles


ssh key choices

This weekend, Rob and I had been testing the use of hardware keys to secure ssh sessions, especially for back-end console access and certain administrative functions. Since the hardware keys are a special case, and cannot be added to the ssh-agent, we were slinging around a fair number of command …


Academia's Tug-of-war with the NSA over Encryption

There's an excellent article, Keeping Secrets, on medium today (originally from the November/December 2014 issue of Stanford Magazine) about the conflict between academic work on cryptography and the NSA's role in national security. Most of the focus is on what happened and not on who was right or wrong …