I've been lurking for the past decade or so. Now I need to recommend Circumvention Technology to be used in a new "denied area".
Can anybody recommend non-compromised firewalls, VPNs, data encryption, secure data storage, etc for folks in a denied area? Any recommended tactics, techniques, and procedures manuals? Policies? Very Respectfully, Joel Harding -- Joel Harding http://toinformistoinfluence.com (703) 362-8582
-- Liberationtech is public & archives are searchable from any major commercial search engine. Violations of list guidelines will get you moderated: https://lists.ghserv.net/mailman/listinfo/lt. Unsubscribe, change to digest mode, or change password by emailing [email protected].
