Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://chaos.social/@txt_file" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>txt_file</span></a></span> if <a href="https://infosec.space/tags/mosh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mosh</span></a> can do tunneling over <a href="https://infosec.space/tags/TCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TCP</span></a> then you essentially have <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a>-<a href="https://infosec.space/tags/Tunneling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tunneling</span></a> over <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a>...</p><p>I'd say that is a valid use-case espechally since <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> <a href="https://infosec.space/tags/OnionServices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnionServices</span></a> are way better than <a href="https://infosec.space/tags/DynamicDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DynamicDNS</span></a> and/or <a href="https://infosec.space/tags/PortForwarding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PortForwarding</span></a> techniques as they also anonymize both source and destination.</p>