In the realm of OS development, a system is only as strong as its weakest vulnerability. System Hardening is the process of securing a system by reducing its surface of vulnerability through the removal of unnecessary software, usernames, or facial logins, and the closing of unused ports.
When accessing your Termux environment remotely, default configurations are often targets for brute-force attacks. We must enforce Public Key Authentication and disable password-based logins.
As an Architect, you must audit your own system to identify open ports that could serve as entry points for intruders.