The keyword in anonymity networks like Tor and I2P is “anonymity,” is it not? Unfortunately, none of these networks, by themselves, provide full anonymity.
As many users of Tor, I2P, and other networks know, it helps to take additional steps to ensure privacy. One out of many methods you can use is SSH (Secure Shell or Secure Socket Shell), which is a cryptographic network protocol that allows administrators to access a computer remotely.
Why use it? Just as users of darknet markets or email services like SIGAINT might encrypt messages with PGP, SSH helps to provide a secure channel over an unsecured network. SSH uses public-key cryptography to authenticate remote computers, and can also authenticate the user, if need be.
Nevertheless, even messages encrypted with SSH can be decrypted, so don’t go thinking that it makes you invincible.
I’m going to discuss six different SSH clients here, but as with the Linux distros I wrote about previously, which one is best may be a matter of personal preference.
NOTE: GNU/Linux systems include the OpenSSH standard by default. It is one that I’ve included here.
PuTTY is a free implementation of Telnet and SSH for Windows and