When I use SSH tunneling, can I assume that the server does not need to be trusted?
I’m evaluating what is the better technique for SSHing into my machines securely, without trusting third parties.
I can connect to my machines through an SSH tunnel, but I need a server in between.
As far as I understood, the target local …