Community Forum

How to cloak an AWS instance yet still access it with

“Cloaking” is a feature of is best illustrated by what happens, for example, at AWS. At AWS there are Security Groups, see

With installed on an AWS VM, for example, your AWS Security Group could use a rule that denies ALL inbound traffic on ALL ports for ALL protocols. Your AWS VM is now “cloaked”. Nobody can scan your “cloaked” VM, nobody can even see that your “cloaked” VM exists because there is no response to any incoming traffic.

Then, handles your connection to this “cloaked” VM using a service (using ssh for example) because establishes connections using outbound traffic from the “cloaked” VM. For example, you could use a firewall rules that similarly cloaks a camera, a wireless basestation, a server or any device using

for additional details.