reply
Half of the IT team I am on is seemingly incapable of understanding using a public/private keypair for SSH logins.
Can I use yours? How to copy them? Should they be unique per user? Should I email the private key? Etc?
My favorite is when someone posts their private key to a Slack or Teams channel, then says "I'll just delete it after it is received..."
No. Just no. That key is forever unclean.
No…