Anonymous SSH over Tor

From Whonix
Jump to navigation Jump to search
SSH Logo

SSH over Tor using Whonix

Anonymity Specific[edit]

Recommendation Description
Keystroke and Mouse Fingerprinting Beware of keyboard keystroke and computer mouse-based deanonymization as explained in the Surfing Posting Blogging chapter.
Mobile Shell Roaming and Echo mosharchive.org might be a useful addition. However, it requires UDP and it is therefore difficult to utilize over Tor, see: Tunnel UDP over Tor. Is it safe to mosh?archive.org

General Security[edit]

Kicksecure seal
Kicksecure Hardened

Redirection to Kicksecure Documentation

Incomplete: This wiki page is incomplete. This it by design. It only contains specific information for Whonix. Below is a link to a wiki page in the Kicksecure wiki with more general information. Reading it is mandatory for full information.

  • Note: Re-interpretation...
Apply the instructions inside Whonix, not Kicksecure.

Kicksecure: Perform these steps inside Kicksecure.

Instead the user should apply the instructions inside Whonix-Workstation.

Kicksecure for Qubes: Perform these steps inside Qubes kicksecure-17 Template.

Instead the user should apply the instructions inside whonix-workstation-17 Template.


We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 13 year success story and maybe DONATE!