From 20f658d85ae28bb1ca12d0f5edb116ec7bba8125 Mon Sep 17 00:00:00 2001 From: Shannon Appelcline Date: Tue, 3 Nov 2020 07:43:19 -1000 Subject: [PATCH] Update 14_3_Adding_SSH_Hidden_Services.md --- 14_3_Adding_SSH_Hidden_Services.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/14_3_Adding_SSH_Hidden_Services.md b/14_3_Adding_SSH_Hidden_Services.md index bf99f48..12ac8ae 100644 --- a/14_3_Adding_SSH_Hidden_Services.md +++ b/14_3_Adding_SSH_Hidden_Services.md @@ -55,3 +55,5 @@ Now that you've got Tor installed and know how to use it, you can add other serv > :fire: ***What's the power of Other Hidden Services?*** Every time you access a service on your server remotely, you leave footprints on the network. Even if the data is encrypted by something like SSH (or TLS), lurkers on the network can see where you're connecting from, where you're connecting to, and what service you're using. Does this matter? This is the question you have to ask. But if the answer is "Yes", you can protect the connection with a hidden service. Move on to "Programming with RPC" with [Chapter Fifteen: Talking to Bitcoind with C](15_0_Talking_to_Bitcoind.md). + +Or, if you're not a programmer, you can skip to [Chapter Eighteen: Understanding Your Lightning Seutp](https://github.com/BlockchainCommons/Learning-Bitcoin-from-the-Command-Line/blob/master/18_0_Understanding_Your_Lightning_Setup.md) to continue your command-line education with the Lightning Network.