Completely agree with you carlos. Vps systems can be snooped on without your
knowledge from the host.

Id feel more comportable with a box at a physical location that I control
running a tor proxy.
On Jan 1, 2011 11:31 AM, "Carlos Perez" <[email protected]>
wrote:
>
> the way I see it any box outside of your physical control can not be
trusted.
> On Jan 1, 2011, at 11:10 AM, Zate Berg wrote:
>
> > Should they also have a strong policy about letting you violate their
> > TOS and not taking action ? :-P
> >
> > Your best bet if that is a requirement is to do a colo of a small
> > server and don't give the colo access.  They are still going to have
> > physical access of the system and the "man" could come knocking with a
> > court order asking them to turn it over.
> >
> > Unless you do something out of the US, your system is ALWAYS going to
> > be at the mercy of the "man" getting  a court order and accessing your
> > info.
> >
> > I have toyed with the idea of creating a hosted system that logs to
> > /dev/null and doesn't keep a single piece of information about who
> > logged into the system from where, when.
> >
> > cloudsigma.com are a pretty good "out of the us" cloud/VPS provider,
> > you might try one of their cheaper tiers and setup your own.  If you
> > might be engaging in activities that could get you in trouble, i would
> > not trust a system built by anyone than yourself so you can be sure
> > what it's logging, or not logging, and who has access.
> >
> > Zate
> >
> >
> >
> > On Fri, Dec 31, 2010 at 5:24 PM, xgermx <[email protected]> wrote:
> >> Thanks for all of the input so far. Keep the suggestions coming.
> >> <tinfoilhat>
> >> Also, the ideal service provider should have a very strong policy about
not
> >> turning over my information if questioned. (rules out Amazon, etc)
> >> </tinfoilhat>
> >>
> >>
> >> On Thu, Dec 30, 2010 at 7:52 PM, Dan King <[email protected]>
wrote:
> >>>
> >>> If you use TOR as a transparent proxy, the speeds you get are much
better.
> >>> The circuits dont get constantly rebuilt.
> >>>
> >>>
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy
> >>> You could run a TOR node on a VPS and use the VPS as your VPN
> >>> concentrator. Then all traffic over the VPN could be then anonymized.
> >>> I have no experience with any commercial VPN solutions that claim to
mask
> >>> your traffic. I'd be a little suspicious of that honestly.
> >>>
> >>> On Thu, Dec 30, 2010 at 2:27 PM, Jim Halfpenny <
[email protected]>
> >>> wrote:
> >>>>
> >>>> Hi,
> >>>> Depends what your needs are. TOR offers anonymity at the expense of
> >>>> speed. SSH tunneling provides point-to-point encryption, as does an
> >>>> IPSec VPN e.g. FreeS/WAN. There are anonymiser services that offer
web
> >>>> proxies but don't encrypt your traffic. Your goals affect the choice
> >>>> of solution best for you.
> >>>>
> >>>> Jim
> >>>>
> >>>> On 30 December 2010 14:41, xgermx <[email protected]> wrote:
> >>>>> Can anyone give a recommendations for a private VPN service?
> >>>>> My goal is to remain anonymous online whilst not sacrificing
bandwidth.
> >>>>> Something like IPREDator, possibly.
https://www.ipredator.se/?lang=en
> >>>>> Google searches for this have proved futile as most results are
> >>>>> spam/seedy
> >>>>> companies.
> >>>>> TIA
> >>>>>
> >>>>>
> >>>>> _______________________________________________
> >>>>> Pauldotcom mailing list
> >>>>> [email protected]
> >>>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> >>>>> Main Web Site: http://pauldotcom.com
> >>>>>
> >>>> _______________________________________________
> >>>> Pauldotcom mailing list
> >>>> [email protected]
> >>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> >>>> Main Web Site: http://pauldotcom.com
> >>>
> >>>
> >>>
> >>> --
> >>> I live in a world of cold steel and dungeons and mighty foes...
> >>>
> >>> _______________________________________________
> >>> Pauldotcom mailing list
> >>> [email protected]
> >>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> >>> Main Web Site: http://pauldotcom.com
> >>
> >>
> >> _______________________________________________
> >> Pauldotcom mailing list
> >> [email protected]
> >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> >> Main Web Site: http://pauldotcom.com
> >>
> > _______________________________________________
> > Pauldotcom mailing list
> > [email protected]
> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> > Main Web Site: http://pauldotcom.com
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to