From 4b28a87a42a0031747e39277e1347992b039cf45 Mon Sep 17 00:00:00 2001 From: Santori Helix <74464484+santorihelix@users.noreply.github.com> Date: Thu, 19 Nov 2020 11:02:18 +0000 Subject: [PATCH] Update split-ssh.md --- docs/configuration/split-ssh.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/configuration/split-ssh.md b/docs/configuration/split-ssh.md index 5ea3779..27945a0 100644 --- a/docs/configuration/split-ssh.md +++ b/docs/configuration/split-ssh.md @@ -6,7 +6,7 @@ This is done by using Qubes's [qrexec][qrexec] framework to connect a local SSH This way the compromise of the domain you use to connect to your remote server does not allow the attacker to automatically also steal all your keys. (We should make a rather obvious comment here that the so-often-used passphrases on private keys are pretty meaningless because the attacker can easily set up a simple backdoor which would wait until the user enters the passphrase and steal the key then.) - ![diagram](https://raw.githubusercontent.com/santorihelix/qubes-splitssh-diagram/85e9cd09854231816f478159c42d5bce3e339648/split-ssh2.svg) + ![diagram](https://raw.githubusercontent.com/santorihelix/qubes-splitssh-diagram/aec07c0f3e78edc6045faadf73805ad820b1d513/split-ssh3.svg) ## Overview