AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Introduction
The hosts discuss the Terrapin SSH vulnerability, including its three vulnerabilities, the potential consequences of downgrade attacks, and the impact on async SSH.