Anonymous SSH over Tor

From Whonix
Jump to navigation Jump to search
SSH Logo

SSH over Tor using Whonix

Anonymity Specific[edit]

Recommendation Description
Keystroke and Mouse Fingerprinting Beware of keyboard keystroke and computer mouse-based deanonymization as explained in the Surfing Posting Blogging chapter.
Mobile Shell Roaming and Echo mosharchive.org might be a useful addition. However, it requires UDP and it is therefore difficult to utilize over Tor, see: Tunnel UDP over Tor. Is it safe to mosh?archive.org

General Security[edit]

Kicksecure: Perform these steps inside Kicksecure.

Instead the user should apply the instructions inside Whonix-Workstation.

Kicksecure for Qubes: Perform these steps inside Qubes kicksecure-17 Template.

Instead the user should apply the instructions inside whonix-workstation-17 Template.

Footnotes[edit]

We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!