Security through obscurity is no security at all.
If you open up SSH to the wide world you secure the hell out of it. Full stop.
Tips, tricks and information about the Tor network!
Security through obscurity is no security at all.
If you open up SSH to the wide world you secure the hell out of it. Full stop.
To my knowledge there is no way to index Tor v3 hostnames unless the owner of the address explicitly shares them. Therefore, even if an attacker knew that I was behind Tor, they would have no way to find out the hostname of my service and connect to it, so it is not security through obscurity. They would have to get into my password manager and steal my public key. Am I wrong about this?
Whatever the case of the hostname being public or not, do you think it is important to add another layer of security such as Wireguard in this case, or is hardening the SSH config enough?
Relying on someone "not finding something out" is by definition security through obscurity. ;)
If you open up SSH to the Internet, any of it, secure it like your life depends on it :).
Look up hardening SSH and just use the same options for Tor as you would for the regular internet.
Two things to keep in mind: