Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

3
  • 2
    The SSH traffic is protected end-to-end (no matter what is in the middle). That is: each end has the correct keys to encrypt and decrypt the content in the connection. Nobody else has those keys, well, as long as the crypto is sound and the implementation is correctly done, the probability of that happening is vanishingly small. Understand that the probability is not zero and mistakes on implementation do happen. However, that is the best we've got yet. Commented Oct 30, 2018 at 3:35
  • @Isaac Would you mind leaving a full answer so I can accept it? Some technical references would be nice too! Commented Oct 30, 2018 at 10:51
  • 1
    @confetti Please, remember to award the bounty to the answer! Commented Nov 5, 2018 at 11:23