mirror of https://gogs.blitter.com/RLabs/xs
Update page 'FAQs'
parent
e357d0514b
commit
b1beee956a
4
FAQs.md
4
FAQs.md
|
@ -31,9 +31,9 @@ Openssh only added PQ algos after I had this project up and running, almost 3 ye
|
|||
A diversity in solutions for network shell access is good.. we've all relied exclusively on `openssh` for a long time, and a monoculture is dangerous. (Recall the 'heartbleed' fiasco and the scramble to fix and/or find other SSL/TLS libraries to avoid a security monoculture).
|
||||
|
||||
|
||||
### Openssh has this cool 'keystroke timing obfuscation', does xs?
|
||||
### Openssh has this cool 'keystroke timing obfuscation' thing, does xs?
|
||||
|
||||
Yeah, I did that early on with this project, almost *five years before openssh announced it* ([Oct 2023 for openssh](https://lwn.net/Articles/946497/) vs. May 6 2018 for xs, commit a1f4e034). It could certainly be improved, but I can say with some confidence that xs did interactive keystroke timing obfuscation *before it was cool* <sips a soy-latte> :P See the discussion on 'chaffing' in general elsewhere in these docs.
|
||||
Yeah, I did that early on with this project, almost *five years before openssh announced it* ([Oct 2023 for openssh](https://lwn.net/Articles/946497/) vs. May 6 2018 for xs, commit a1f4e034). It could certainly be improved, but I can say with some confidence that xs did interactive keystroke timing obfuscation (and file copy traffic too!) *before it was cool* <sips a soy-latte> :P See the discussion on 'chaffing' in general elsewhere in these docs.
|
||||
|
||||
|
||||
### You should have written it in Rust!
|
||||
|
|
Loading…
Reference in New Issue