

All the more reason to give him hell for doing a terrible job. If you can’t handle the heat get out of the kitchen.
All the more reason to give him hell for doing a terrible job. If you can’t handle the heat get out of the kitchen.
Generate a unique key for each client or device. SSH keys identify devices, not people, so I do not recommend sharing the same key between two different devices.
I generally do a few things to protect SSH:
So far I haven’t seen any attempts to change their user agents. I’ve seen one or two other bots poking around, but nothing to write home about so I’ve left them alone.
I have heard however that changing user agents is a tactic they do indeed employ, especially Claude, so it may be that I’ll eventually have to adapt my defenses.
I’ve been fending off AI bots the last week or so; wrote about it here:
https://gerowen.substack.com/p/the-ai-data-scraping-is-getting-out
The hard part is finding an acceptable balance between good OPSEC but not pre-emptive compliance.