Hacker News new | past | comments | ask | show | jobs | submit login

Brute-forcing a key is pretty much impossible and people - despite all advice - still use short and insecure passwords. Certainly a machine that does not root login at all is better than a machine with key-based root login, but a machine with key-based root login is better than password based root login. The perfect is the enemy of the good here.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: