

That is infuriating. Leaving those keys available to the user means that worms can later use you to compromise additional machines. It turns a local problem into a much bigger one. There’s a recursive script out there that automatically scans your ssh files and attempts to access all hosts in your history…name escapes me at the moment.





















Defense in depth is a thing. You don’t give up just because someone made it through the first layer.