http://ciisqbg45nggykdl6rjdrq3wc64csga4vkphu66qsi65mypeitqedoad.onion/blog/port-striping-v3
                                
                                
                                                                            Attackers will use something like masscan to scan the whole internet to find SSH servers, then a separate program will try to brute force an account on that server, hoping to find one with a guessable password. Doing that against our SSH tunneling servers isn't very smart because the configs used are public knowledge , and if they bothered reading that blog post they'd see that the only user allowed is 'sshtunnel', and its password is also 'sshtunnel', and that it's...