SSH is a core tool in a sysadmin's arsenal. It is mainly used to remotely control a machine.
Use stronger ssh keys.
ssh-keygen -t ed25519
Prefer SSH servers available through a Tor Onion Service for stronger encryption and authentication. Tor also provides NAT hole-punching so you don't need to register with a DNS service nor open up your LAN to outside access.
Any references to SSH breaks in the Snowden archives applied to some outdated ciphers. This has since been addressed by hardened OpenSSH settings (which are included in Whonix) and upstream disabling vulnerable algorithms.
Beware of keyboard keystroke and computer mouse based deanonymization as explained under Surfing Posting Blogging.