When I first started writing this post I was thinking about the dangers of generating and using ssh keys for authentication on shared platforms. If you’re like me and enjoy the convenience of using private and public key pairs for ssh authentication, you’ve probably heard it a million times that […]