Is the same key used for Authorization and Encryption? (SSH Tunnel)
I am a bit confused on how SSH encryption works.
From reading this question, I see you can use a private key to authenticate with the -i flag.
I also know think that SSH encrypts data using private and public keys.
I … Continue reading Is the same key used for Authorization and Encryption? (SSH Tunnel)