I've had several people PM me in reference to this post criticizing me for RDPing over an insecure adhoc wireless network and a cellular connection.
I'm not doing that.
The wifi connection is WPA2 encrypted, my connection to my work machine is actually through a VPN, and the RDP connections are required to be tunneled through SSH, for reasons I've never entirely understood.
I'm not just driving down the road passing client data around in the clear, y'all.
@ajroach42 Yeah, but imagine the chase scene!
"Follow that car! No, closer—I'm hacking his wifi..."
@ajroach42 On a more serious note, the best way to secure VNC that I've found so far is to ssh with X-forwarding, and from there VNC to localhost, so the remote client window displays on the local machine... -.-
(I don't trust VNC auth, by default, since it's less studied. Don't know what RDP is like, but maybe that's why the requirement.)
@ajroach42 Oh, because I'm usually VNC'ing to a system that already has GUI programs running—my home laptop! (For that matter, not everything X-forwards cleanly. But the VNC client window does.)