| ▲ | tharkun__ 7 hours ago | |||||||
This seems to be the standard thing people miss. All the things that make security more convenient also make it weaker. They boast about how "doing thing X" makes them super secure, pat on the back and done. Completely ignoring other avenues they left open. A case like this brings this out a lot. Compromised dev machine means that anything that doesn't require a separate piece of hardware that asks for your interaction is not going to help. And the more interactions you require for tightening security again the more tedious it becomes and you're likely going to just instinctively press the fob whenever it asks. Sure, it raises the bar a bit because malware has to take it into account and if there are enough softer targets they may not have bothered. This time. Classic: you only have to outrun the other guy. Not the lion. | ||||||||
| ▲ | otterley 7 hours ago | parent [-] | |||||||
See my comment above; not every SSH agent is alike. | ||||||||
| ||||||||