mirror of
https://github.com/Qubes-Community/Contents.git
synced 2024-12-23 06:09:29 -05:00
Update split-ssh.md
This commit is contained in:
parent
4b28a87a42
commit
718dd9ae63
@ -6,7 +6,7 @@ This is done by using Qubes's [qrexec][qrexec] framework to connect a local SSH
|
|||||||
This way the compromise of the domain you use to connect to your remote server does not allow the attacker to automatically also steal all your keys.
|
This way the compromise of the domain you use to connect to your remote server does not allow the attacker to automatically also steal all your keys.
|
||||||
(We should make a rather obvious comment here that the so-often-used passphrases on private keys are pretty meaningless because the attacker can easily set up a simple backdoor which would wait until the user enters the passphrase and steal the key then.)
|
(We should make a rather obvious comment here that the so-often-used passphrases on private keys are pretty meaningless because the attacker can easily set up a simple backdoor which would wait until the user enters the passphrase and steal the key then.)
|
||||||
|
|
||||||
![diagram](https://raw.githubusercontent.com/santorihelix/qubes-splitssh-diagram/aec07c0f3e78edc6045faadf73805ad820b1d513/split-ssh3.svg)
|
![diagram](https://raw.githubusercontent.com/santorihelix/qubes-splitssh-diagram/5498bd02db903bf5eedcafa2a952452d77dda6a8/split-ssh3.svg)
|
||||||
|
|
||||||
## Overview
|
## Overview
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user