• tasankovasara@sopuli.xyz
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    2 days ago

    Yes, or SSH keys or any other means of user authentication. The cool thing in this technique is that it’s twofold and you (as an attacker) can cherry-pick the info given. If you walk up locally to someone’s running system, you could skip the first half and go with the ‘hey, can you resize this XFS image for me’ bit.