this post was submitted on 02 May 2026
666 points (99.9% liked)

People Twitter

9905 readers
835 users here now

People tweeting stuff. We allow tweets from anyone.

RULES:

  1. Mark NSFW content.
  2. No doxxing people.
  3. Must be a pic of the tweet or similar. No direct links to the tweet.
  4. No bullying or international politcs
  5. Be excellent to each other.
  6. Provide an archived link to the tweet (or similar) being shown if it's a major figure or a politician. Archive.is the best way.

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] MousePotatoDoesStuff@piefed.social 5 points 10 hours ago (2 children)

From my experience, a password is a tool used to secure my workday from a bad guy called "productivity".

Because why use an SSH key when I can enter the same username and password I used to log into the workstation every time I need to do something through the VPN? (It keeps logging off every time the connection breaks.)

[–] ApertureUA@lemmy.today 1 points 2 hours ago* (last edited 2 hours ago)

If there's no ForceCommand (I think that's what it was called?) in sshd.conf and no command=x in .authorized_keys (if any), you can probably use mosh. It spins up SSH to authenticate and then immediately start a UDP based connection afterwards. Instead of logging out every 15 minutes, you will get a "Last contacted X seconds ago" overlayed every minute, that's sure an improvement. Do note, however, that it keeps your shell running with no way to reattach to it if your machine turns off.

[–] conartistpanda@lemmy.world 1 points 10 hours ago (1 children)

What if hacker steals the SSH key?

Then they might as well steal the password from my clipboard.