Anonymous SSH over Tor
Jump to navigation
Jump to search
SSH over Tor using Whonix
Anonymity Specific[edit]
Recommendation | Description |
---|---|
Keystroke and Mouse Fingerprinting | Beware of keyboard keystroke and computer mouse-based deanonymization as explained in the Surfing Posting Blogging chapter. |
Mobile Shell Roaming and Echo | mosh might be a useful addition. However, it requires UDP and it is therefore difficult to utilize over Tor, see: Tunnel UDP over Tor. Is it safe to mosh? |
General Security[edit]
Footnotes[edit]
We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!