a product that promises encrypted, reliable remote connections over unstable networks—without the lag, without the dropouts. You launch it, and it connects. Simple. Fast. Persistent.
Mosh, short for Mobile Shell, is an alternative to SSH built for real-world connectivity problems. Where SSH freezes or disconnects when your Wi‑Fi flickers or you switch networks, Mosh maintains the session. Packets are authenticated and encrypted using AES‑256, with poly1305 for message integrity. This means your data remains secure while latency feels minimal.
The core security model of Mosh relies on UDP instead of TCP. This design eliminates TCP's head-of-line blocking and lets sessions survive IP changes. The initial handshake still uses SSH for authentication, so your existing keys and configurations remain valid. After the handshake, Mosh switches to its own encrypted channel, independent of SSH’s transport layer. This separation reduces attack surface tied to TCP state tracking, but it does mean administrators must understand the boundaries between SSH authentication and Mosh's subsequent datagram-based protocol.
For engineers who need more than promises, Mosh’s source code is available under an open-source license for audit. Reviewing it shows a clean cryptographic implementation with no dependence on legacy algorithms like MD5 or SHA‑1. The security properties are well-defined: ephemeral keys, forward secrecy, integrity checks on every packet. Vulnerability history is minimal; reported issues have typically been environment-specific rather than protocol flaws.