{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"Why is it not recommended to use password-based authentication when accessing SSH?","a":"Lower security: Password-based authentication is vulnerable to brute-force attacks, dictionary attacks, and other methods, as hackers can try numerous passwords to crack user accounts. This is especially true in public spaces or shared hosting environments, where the risk of password leaks is higher."}]}],"pr":"d6820d781c131c5f1b4a3fa23d4b0801f6ebbbd0a83575d12ab83c76e03d98d2"}