by Haja Mo January 2, 2023 Cybersecurity The bad news: the crooks have your SSH private keys. The good news: only users of the “nightly” build were affected. Previous Story How does Two-factor authentication (2FA) work? Next Story How to prevent identity theft