this post was submitted on 02 May 2026
1017 points (99.7% liked)

People Twitter

9917 readers
1237 users here now

People tweeting stuff. We allow tweets from anyone.

RULES:

  1. Mark NSFW content.
  2. No doxxing people.
  3. Must be a pic of the tweet or similar. No direct links to the tweet.
  4. No bullying or international politcs
  5. Be excellent to each other.
  6. Provide an archived link to the tweet (or similar) being shown if it's a major figure or a politician. Archive.is the best way.

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] MousePotatoDoesStuff@piefed.social 8 points 2 days ago (2 children)

From my experience, a password is a tool used to secure my workday from a bad guy called "productivity".

Because why use an SSH key when I can enter the same username and password I used to log into the workstation every time I need to do something through the VPN? (It keeps logging off every time the connection breaks.)

[–] ApertureUA@lemmy.today 2 points 1 day ago* (last edited 1 day ago) (1 children)

If there's no ForceCommand (I think that's what it was called?) in sshd.conf and no command=x in .authorized_keys (if any), you can probably use mosh. It spins up SSH to authenticate and then immediately start a UDP based connection afterwards. Instead of logging out every 15 minutes, you will get a "Last contacted X seconds ago" overlayed every minute, that's sure an improvement. Do note, however, that it keeps your shell running with no way to reattach to it if your machine turns off.

Thanks for the advice!

[–] conartistpanda@lemmy.world 1 points 2 days ago (1 children)

What if hacker steals the SSH key?

[–] MousePotatoDoesStuff@piefed.social 4 points 2 days ago (1 children)

Then they might as well steal the password from my clipboard.

[–] conartistpanda@lemmy.world 1 points 1 day ago

What if it steals the clipboard so you cant copy paste?