Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "key exchange"
-
TLDR: There’s truth in the motto “fake it till you make it”
Once upon a time in January 2018 I began work as a part time sysadmin intern for a small financial firm in the rural US. This company is family owned, and the family doesn’t understand or invest in the technology their business is built on. I’m hired on because of my minor background in Cisco networking and Mac repair/administration.
I was the only staff member with vendor certifications and any background in networking / systems administration / computer hardware. There is an overtaxed web developer doing sysadmin/desktop support work and hating it.
I quickly take that part of his job and become the “if it has electricity it’s his job to fix it” guy. I troubleshoot Exchange server and Active Directory problems, configure cloudhosted web servers and DNS records, change lightbulbs and reboot printers in the office.
After realizing that I’m not an intern but actually just a cheap sysadmin I began looking for work that pays appropriately and is full time. I also change my email signature to say “Company Name: Network Administrator”
A few weeks later the “HR” department (we have 30 employees, it’s more like “The accountant who checks hiring paperwork”) sends out an email saying that certain ‘key’ departments have no coverage at inappropriate times. I don’t connect the dots.
Two days later I receive a testy email from one of the owners telling me that she is unhappy with my lack of time spent in the office. That as the Network Administrator I have responsibilities, and I need to be available for her and others 8-5 when problems need troubleshooting. Her son is my “boss” who is rarely in the office and has almost no technical acumen. He neglected to inform her that I’m a part time employee.
I arrange a meeting in which I propose that I be hired on full time as the Network Administrator to alleviate their problems. They agree but wildly underpay me. I continue searching for work but now my resume says Network Administrator.
Two weeks ago I accepted a job offer for double my current salary at a local software development firm as a junior automation engineer. They said they hired me on with so little experience specifically because of my networking background, which their ops dept is weak in. I highlighted my 6 months experience as Network Administrator during my interviews.
My take away: Perception matters more than reality. If you start acting like something, people will treat you like that.2 -
Diffie–Hellman key exchange is not allowed in this area. For your convenience, an SSL stripper was placed on to every near network.2
-
Legacy tech be like:
"The connection to this site uses TLS 1.0 (an obsolete protocol), RSA (an obsolete key exchange), and AES_128_CBC with HMAC-SHA1 (an obsolete cipher)."2 -
When I think "the fundamental problem", the closest thing that comes to my mind is "unsolvable problem". P =/!= NP is a fundamental problem, the theory of everything is a fundamental problem.
But we actually solved at least one such problem – the fundamental problem of cryptography.
The problem was "how to establish a secure connection over a non-secure channel?" Like you can't exchange the key, it'll be exposed by definition.
We solved it with a simple yet brilliant solution of asymmetrical cypher, that thing with public and private keys.
It's fascinating to think that people died in WW2 over this, there were special operations to deliver fresh deciphering keys securely and now SSH and HTTPS are no-brainers that literally everyone use.10 -
An identity platform where you can find each other, get the other's public key and preferred contact method. And the entire key exchange and choice of contact method are negotiated automatically. No vendor lock in, encryption happens on your own device. Effortlessly and securely communicating, no searching for skype name, email, phone number, setting up shit. It would just work.7
-
I work for a cryptocurrency exchange as a senior developer - I'm pretty much one of the key people keeping the lights on in terms of backend and operational functions.
Yet I'm sitting in the bank trying to extend my credit card limit, just to makes ends meet.6 -
When I found out that the server I use weirdly implements SSH login.
For some very odd reason (probably a historical one,) you have to access the web-app console and press a button TO GRANT SSH ACCESS TO THE F*<KING IP ADDRESS FROM WHICH I PRESSED THE BUTTON. The server blocks the wrong IP addresses outright. And only one active allowed IP at a time. This totally obliterates my plan to perform CD on this server. Why can't I just register public keys?
Then I learned several months later that they introduced a new server plan that *does* support the public-key registration. :facepalm:
I'm divided on whether to change my plan in exchange for a rather significant increase in the monthly cost.3 -
I've been working for so long with API integrations and one part of that is security. We perform ssl key exchanges for 2-way verification and a large percent of those partners provides me with their own pkcs12 file which contains their private and public keys! What's the sense of the exchange!? I think they just implement it just to boast that they "know" how ssl works,
-
On Linux I want to scp a file from Machine B to my machine A.
Assuming B allows all connections is any key/cert file exchange needed?
I recall whenever I SSH to a new machine I need to accept a key on the first connect.
Guess general question is what is the connection process between 2 Linux machines for sftp purposes?9 -
Guaranteed Way to Recover Scammed Crypto with Puran Crypto Recovery
Cryptocurrency scams have become an unfortunate reality in today’s digital age, with many investors losing significant amounts of money to fraudulent schemes. Whether it's through phishing attacks, Ponzi schemes, or fake ICOs, the rise of these scams has left many victims feeling helpless. But with the right approach and expertise, recovering lost or stolen crypto is possible. Puran Crypto Recovery offers a guaranteed way to recover your scammed cryptocurrency, leveraging advanced blockchain tools, expert investigators, and legal professionals to ensure the best chance of reclaiming your assets.
How Puran Crypto Recovery Helps in Scammed Crypto Recovery
Puran Crypto Recovery has been at the forefront of cryptocurrency recovery services, offering specialized solutions to victims of scams. Our process is thorough and involves utilizing cutting-edge blockchain technology, experienced crypto investigators, and strategic collaborations with law enforcement and exchanges to recover your funds.
Blockchain Forensics: One of the most effective methods of recovering scammed crypto is through blockchain forensics. Puran Crypto Recovery employs advanced blockchain analysis tools to trace stolen funds across multiple wallets and blockchain networks. This allows us to identify the destination of your cryptocurrency, and we work with exchanges and law enforcement to track and seize the stolen funds.
Expert Crypto Investigators: Our team of highly skilled crypto investigators is experienced in analyzing blockchain data and identifying fraudulent addresses. They utilize proprietary tools and techniques to trace the flow of stolen funds, ensuring that no matter how complex the scam, we can find a way to recover your assets.
Collaboration with Exchanges and Law Enforcement: Recovering funds from a scam often requires coordination with cryptocurrency exchanges and law enforcement agencies. Puran Crypto Recovery has established relationships with major exchanges and authorities worldwide, which allows us to quickly act on your behalf and increase the chances of recovering your funds. Our legal team also provides support to pursue criminal and civil actions against the scammers.
Guaranteed Process for Recovery
At Puran Crypto Recovery, we follow a streamlined and transparent process to recover scammed crypto. Here’s how it works:
Consultation: The first step is a consultation where we assess your case and understand the details of the scam. Our experts will gather all necessary information about the transaction and the type of scam that took place.
Investigation: Using our advanced blockchain analysis tools, we begin tracing the stolen funds. We identify wallet addresses, track the funds’ movement, and determine where the assets are located.
Coordination: Once the funds are traced, we reach out to the exchanges, wallets, and law enforcement agencies involved. We provide them with the necessary evidence to take action and initiate the recovery process.
Recovery: In cases where the funds are located within an exchange or a known wallet, we work with these entities to freeze the assets and recover them. We ensure that all legal procedures are followed to retrieve the funds and return them to the rightful owner.
Legal Support: If necessary, our legal team will guide you through any legal steps required to complete the recovery process. This may include filing claims or taking legal action against scammers, ensuring that you have full support in every step of the journey.
Benefits of Choosing Puran Crypto Recovery
Expertise in Cryptocurrency: Our team specializes in crypto recovery, with years of experience in blockchain forensics, crypto law, and digital asset protection.
Proprietary Technology: We use the latest blockchain analysis tools to track stolen funds across multiple platforms and wallets.
Global Reach: We work with exchanges and law enforcement across the globe, enabling us to take action quickly and recover your assets, regardless of where the scam took place.
Guaranteed Success: While no recovery service can promise 100% success, Puran Crypto Recovery has a high success rate due to our diligent investigation process and close collaboration with key stakeholders.
Contact Puran Crypto Recovery for Guaranteed Fund Recovery
If you’ve been the victim of a cryptocurrency scam, don’t lose hope. Puran Crypto Recovery offers a reliable and guaranteed way to recover your scammed crypto. Our team of experts is dedicated to helping you track and recover stolen funds through innovative technology, expert investigation, and legal support.