git - How to contribute on github anonymously via Tor
Anonymous SSH Sessions With TOR OpenSSH is a great means to protect your connection from being sniffed by others. However, this isn't always enough. Simply proving that you connected to a server is enough to get incriminated. How to run an SSH connection through Tor - TechRepublic May 25, 2020 doc/TorifyHOWTO/ssh – Tor Bug Tracker & Wiki
Is Tor Trustworthy and Safe? (Read This Before Using Tor)
SSH is a software package that enables secure system administration and file transfers over insecure networks. It is used in nearly every data center and in every large enterprise. This page was created by the inventor of SSH, Tatu Ylonen (twitter: @tjssh). He wrote ssh-1.x and ssh-2… SSH over Tor
The person running the tor exit node could sniff the traffic in the same way you would with the SSH server. On the plus side with SSH tunnelling you know where the exit point is and if you have control of that server you know if it's likely to be sniffed or not.
The easiest way to get the Tor client running on any system is to install the Tor Browser Bundle. It contains a hardened version of Firefox and creates a SOCKS5 proxy on localhost host port 9150 that other proxy-aware applications such as SSH can use. We’ll need Tor-protected SSH to set up our hidden service. Installing the Tor browser for SSH tunnelling is an alternative method of using TorVPN. It is not a VPN. It is secure and doesn't need administrator privileges, but it does not redirect all of your traffic automatically as OpenVPN does. After you have set up the SSH tunnel, you need to configure your browser (or other software) to make use of the tunnel created with it. SSH (Secure Shell) This is the start page for the SSH (Secure Shell) protocol, software, and related information. SSH is a software package that enables secure system administration and file transfers over insecure networks. It is used in nearly every data center and in every large enterprise. It’s important to do this before you log in over Tor, but you can check after the fact by looking for the public key in ~/.ssh/known_hosts (if you don’t obfuscate that file). It should obviously be the same over Tor and the clearnet. OK, let’s connect. Run torify ssh -i ~/.ssh/id_ed25519 firstname.lastname@example.org