Can a malicious SSH server successfully *pretend* to know a client’s public key?

Yes, I know that after giving an SSH public key to someone else, one should always assume that it might have been swiftly published somewhere. (For instance, give your SSH public key to GitHub, and GitHub will publish it. E.g… Continue reading Can a malicious SSH server successfully *pretend* to know a client’s public key?

How can an end-user verify the authenticity of a third-party authentication provider’s login form

Given the ubiquitous use of third party authentication providers in web apps today, how can end-users verify the authenticity of the login forms that collect their credentials? What’s to stop a malicious website from displayi… Continue reading How can an end-user verify the authenticity of a third-party authentication provider’s login form