blog post cover

Why Hooposhell is Secure and Reliable

Let's check custom remark plugin dev

Hoposhell relies on the same security systems as SSH, the reference secure shell used by many. It has been tested for months on remote computers with erratic internet access and has never failed us.

Hoposhell communications are Encrypted

Like SSH, all the communications between your remote machine and the Hoposhell servers are encrypted with OpenSSL. We use a key size well above what modern technology allow hackers to decrypt. It relies on the RSA encryption protocol, where each end encrypt with each-other public key, but can only decrypt with their own private key. Each shell uses its own set of keys on both ends, shutting the door to many kinds of common attacks.

Hoposhell uses certificate-based authentication

Like SSH and HTTPS, each Hoposhell shell only connects to the server after checking its SSL certificate, that is, after making sure that the server is actually hoposhell.com. This avoids common attack such as man in the middle, when a rogue server pretends to be the Hoposhell server and gains access to your machine.

Hoposhell has been proven very stable

Hoposhell technoogy has been tested for several month in several types of machines: Jetson Nano connected via eratic 3G network, Rapberry Pi connected via weak Pulic Wifi, Mini PC on Wimax connection in the middle of rice fields. After several iterations, we have build a custom shell client using tje Rust language. This new client has proven to be stable enough to never fail us: even when the connections becomes very unstable for minutes or hours, the remote shell has always been back.