; <<>> DiG 9.10.6 <<>> AAAA isanybodyusingthisprivatekey.com.
;isanybodyusingthisprivatekey.com. IN AAAA
If this service was serious, it'd instead rely on fingerprints (sha256/sha512) and not the key itself.
Bonus points: monkeysphere and certificate based auth are two other great solutions for making sure the ssh server you log into is not doing a MITM on initial connection (you know, the part where it asks you to manually verify the fingerprint of the server key and you likely just hit y instead).
Forwarding your ssh agent to a host that you don’t know for certain is not doing a MITM attack on you can be devastating, as is entering a password into same.
Not long after the first milestone of a project with lots of milestones he announced he intended to have me to generate ‘real’ keys for the project and send him the key pairs over Outlook Encryption. For a project with public safety concerns written all over it, and would later have me pick multiple Hardware Security Modules for different steps of a multi-signature chaining process.
He tried to get me into trouble for telling him, politely, that he could fuck right off. And then had to talk to everyone he tried to tattle to about why he was a dumbass and that we were at least a year (turned out to be three) before we needed “real” keys - we were actually about four months from even needing fake keys for integration testing, let alone real keys. And I was be writing up runbooks for doing that rather than doing it for people.
The thing I would soon discover about signing keys is that everyone thinks they are a magic incantation of math. They’re just math. The magic is not inside the box, the magic is the box. It’s like a clean room: It’s a room full of nothing. What makes it special is all the work you do trying to prevent something from happening to it.
I stayed on that project almost a year past where there was any code they needed me to write (except for one bad bug I would find in my code a few months later), but they still needed me to teach them behavior, to lock in that clean room mindset.
Oh, OK.
Exactly what a phishing website would say.
They are now!
These joke pages have been around since http://ismycreditcardstolen.com/
And I even made my own version https://hasmypasswordbeenstolen.net/
The difference is that neither the original nor mine actually submits the secret to the server. I went to great lengths to avoid actually doing it, it's still a bad idea to send a password to my page but at least you can check the source and network traffic and see that it's only checked with JavaScript and a hash is checked against the HIPB password site.
This supposed joke site sends and processes the key on their backend. At least it looks like that, I have not tried with a real key.
https://stackoverflow.com/a/43636715
Edit: fixed missing exponent notation
joemazerino•4h ago
kekebo•4h ago
cryptonym•4h ago
skrebbel•4h ago
benmmurphy•4h ago
inetknght•4h ago
didgeoridoo•4h ago
mondobe•4h ago
DonHopkins•4h ago
https://wordpress.com/plugins/browse/counter