ssh fingerprint verification
this article assumes that you have recently become paranoid accessing a server and are assuming that someone has sent you an erroneous / malicious key for MITM or some other weird purpose. this article also assumes that you have access to the other box already to do key verification. so you go to ssh into … Read More