Do we have conflicting premises about what SSH is? I'm pretty sure you're dodging and deflecting from the actual issues here.
They were clearly suggesting that there exists a publicly available tool to attack this algorithm. They clearly didn't care one way or the other about whether it was used in passwords. What they actually cited was vulnerabilities in network services.
Do we have conflicting premises about what SSH is? I'm pretty sure you're dodging and deflecting from the actual issues here.
They were clearly suggesting that there exists a publicly available tool to attack this algorithm. They clearly didn't care one way or the other about whether it was used in passwords. What they actually cited was vulnerabilities in network services.
You are being disingenuous. Cut it out.