OpenSSL, LibreSSL, OpenSSH users, don’t worry – you can sit this one out

An academic study has shown how it’s possible for someone to snoop on certain devices’ SSH connections and, with a bit of luck, impersonate that equipment after silently figuring out the hosts’ private RSA keys.…