|
X protocol communication is unencrypted
Host-based sessions implemented through the xhost command
User-based sessions implemented through the Xauthority mechanism
sshd may automatically install xauth keys on remote machine
- Tunnels X protocol over secure encrypted ssh connection
|