SSH has been the default for remote terminal access for thirty years. For running Claude Code, Ollama, and other AI CLIs from mobile or a shared browser, there's a better fit in 2026.
TL;DR. SSH remains excellent for server administration, scripting, and one-shot commands. For interactive AI work from a phone, iPad, or cafe laptop, AITerm removes three sharp edges: no inbound port, no SSH client install on the remote device, and no multiplexer setup (tmux/screen) to survive disconnects. Keep SSH for ops; reach for AITerm for Claude/Ollama sessions.
To reach a Claude Code session on your home dev box from a phone on mobile data, a typical SSH setup needs:
tmux or screen on the dev box so the Claude session survives when your phone loses signal. Remembering tmux bindings on a touch keyboard is an acquired taste.Every item is solvable. The cost is configuration, client licenses, and ongoing maintenance.
| AITerm | SSH + tmux + mobile app | |
|---|---|---|
| Inbound port required | No | Yes (or jump host / VPN) |
| Works on mobile browser | Yes, natively | Needs paid SSH app |
| Session survives disconnect | Yes (PTY manager daemon) | With tmux/screen setup |
| Multi-AI discovery | Built-in scan | Manual |
| Team view-sharing | Invites + share links | Complex (tmate, etc.) |
| File upload (drag & drop) | Yes | scp / sftp separately |
| Voice input | Built-in (SpeechRecognition) | No |
| Client cost on mobile | Free (browser) | Paid SSH app usually |
| Works in restricted networks | Outbound HTTPS only | Depends on firewall policy |
| Encryption | TLS 1.2+ with cert pinning | SSH protocol (strong) |
| Auth mechanism | Email/password + paired token | SSH keys (best practice) |
| Update integrity | Ed25519-signed manifest + SHA-256 per file | Apt/apk package signing |
| Open source | Connector is MIT | OpenSSH is BSD |
SSH with key authentication is one of the most battle-tested protocols in software. AITerm is newer and smaller in scope.
What changes in the threat model:
AWS_*, ANTHROPIC_API_KEY, GITHUB_TOKEN, *_SECRET etc. are filtered out of the connector-process env and don't leak into spawned sessions. SSH inherits whatever the login shell has.Neither tool is "more secure" in absolute terms. They're different scopes, and the right one depends on what you're actually doing.
Most developers end up running both. SSH for admin; AITerm for AI. They complement more than they compete.
No. AITerm uses a different auth mechanism (paired token + browser session). Your SSH keys stay where they are for everything else.
Yes — they don't conflict. AITerm runs as a systemd service and doesn't touch your SSH daemon or configuration.
The installer asks. System-wide mode runs as root (like sshd or docker-daemon). Per-user mode runs under a regular user via systemctl --user. Unit files are hardened with NoNewPrivileges, ProtectHome, ProtectKernel*, RestrictNamespaces and similar.
AITerm uses TLS over port 443 (WSS). If HTTPS works, AITerm works. Corporate proxies with deep-packet inspection that specifically strip WebSocket upgrade headers are the only blocker — rare in practice.
One command installs the connector and prints a pairing link: