fedops blog

Privacy in Computing

Fri 02 September 2022

Using Yubikeys for SSH

Posted by fedops in Security   

Something I've been meaning to try for a while was using a physical MFA token in conjunction with SSH to secure connections to remote servers. I've been casually reading blogs on the subject, but it seemed to be a bit of faff surrounding the issue.

Then when the OpenSSH project released version 8.2 it came with support built-in and "only" like 2.5 years later I finally got around to try it out...

Part …

Read more...


Wed 25 May 2022

The Case for Per-Service Email Addresses

Posted by fedops in Security   

Phishing, online scams, and identity theft are big problems. All three of them are quite closely related, and to a significant degree revolve around something virtually everyone has these days - an email address. Let's look at the definitions real quick:

Phishing is a type of social engineering where an attacker sends a fraudulent (deceptive) message designed to trick a person into revealing sensitive information to the attacker.

A scam is a deceptive scheme or trick …

Read more...