I definitely would not want to use a hostile machine to access my servers remotely, period.
Sure, this will let you bypass outbound port restrictions, but it doesn't help in the slightest if every keystroke is keylogged.
Keystrokes being logged could be avoided with 2FA plus not typing in sensitive content.
That doesn't secure you against MITM from the machines. E.g. if the machine is taken over locally or remotely or there's spyware running on it, you could still end up compromised.
(I'm not saying you should do this; you probably shouldn't.)
Fnoord|6 years ago
That doesn't secure you against MITM from the machines. E.g. if the machine is taken over locally or remotely or there's spyware running on it, you could still end up compromised.
(I'm not saying you should do this; you probably shouldn't.)