74B Posted November 21, 2018 Share Posted November 21, 2018 Is there a certain encryption algorithm that i should use when creating an ssh key pair that will bypass network-based inline traffic inspectors (eg CryptoAuditor). Maybe im using the wrong one (ssh-keygen -t rsa -b 4096) and i'll get pulled up? Any info on how these bits of kit makes me visible and how to bypass them will be greatly appreciated. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.