I read most of this article trying to determine if I was impacted, so to save you the trouble:

The researchers traced the keys they compromised to devices that used custom, closed-source SSH implementations that didn’t implement the countermeasures found in OpenSSH and other widely used open source code libraries.

  • @BestBouclettes
    link
    English
    18 months ago

    I migrated most of my keys to ed25519 a while ago, I probably should keep going