Security Playground

Fun experiments with security, SSH, hardware keys, and systems research