SSH is a core tool in a sysadmin's arsenal. It is mainly used to remotely control a machine.
Use stronger ssh keys.
ssh-keygen -t ed25519
Prefer SSH servers available through a Tor Onion Service for stronger encryption and authentication. Tor also provides NAT hole-punching so you don't need to register with a DNS service nor open up your LAN to outside access.
Any references to SSH breaks in the Snowden archives applied to some outdated ciphers. This has since been addressed by hardened OpenSSH settings (which are included in Whonix) and upstream disabling vulnerable algorithms.
Beware of keyboard keystroke and computer mouse based deanonymization as explained under Surfing Posting Blogging.
No user support in comments. See Support.
Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See Wiki Comments Policy.
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix, then Edit! Edits are held for moderation.
Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP. Whonix is a trademark. Whonix is a licensee of the Open Invention Network. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix itself. (Why?)