Using public networks for sensitive online communication is inherently risky. Anything that is not transferred through a secured connection is publicly visible. After snooping network traffic at various public wifi hotspots (for academic purposes) I have become a more paranoid web surfer. The https and padlock just aren’t good enough for me anymore. So, whenver […]
This is a mini guide on setting up public/private key authentication for SSH. There are several benefits for doing this. For example, it can be used to automate authentication, or to enhance security by requiring a pre-generated key in addition to a normal password.