SSH Hardening with ssh-audit
![SSH Hardening SSH Hardening with ssh-audit](/posts/ssh-audit/images/ssh.webp)
Today I explored ssh-audit, a tool designed to audit SSH configurations. Although it’s an excellent tool, I found the hardening guides somewhat lacking. Hence, I decided to write a detailed walkthrough, ensuring the ssh/sshd configurations are easily readable.
Simple Privacy - A Layered Approach
![Simple Privacy Simple Privacy - A Layered Approach](/posts/privacy/images/privacy-logo.webp)
The internet was never designed with privacy in mind. A majority of the protocols we use today were conceived without any security or privacy considerations. This guide is for those who value their privacy and can spare a few minutes to configure their system. It is not intended to be an exhaustive list of recommendations, but a source of simple privacy-enhancing tips for the average user.