On Thu, 2010-10-07 at 21:26 -0700, Robert Ransom wrote:
On Thu, 7 Oct 2010 23:58:28 -0400
grarpamp grarp...@gmail.com wrote:
a free VPN
There are VPN providers that will let you pay anonymously.
Among others, I would be interested in reading posts
containing lists of VPN providers
On Thu, Oct 7, 2010 at 5:19 AM, John Brooks spec...@dereferenced.net wrote:
On Wed, Oct 6, 2010 at 9:11 PM, Load Bear loadbear...@gmail.com wrote:
I am aware of that limitation. However, I am currently less concerned
about eavesdroppers between a given VPN and the destination than I am
about
a free VPN
There are VPN providers that will let you pay anonymously.
Among others, I would be interested in reading posts
containing lists of VPN providers that offer one or more
of these two services. Thanks.
***
To
On Thu, 7 Oct 2010 23:58:28 -0400
grarpamp grarp...@gmail.com wrote:
a free VPN
There are VPN providers that will let you pay anonymously.
Among others, I would be interested in reading posts
containing lists of VPN providers that offer one or more
of these two services. Thanks.
No --
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- From what I have read, it is at least theoretically possible for someone
running a Tor exit node to monitor any plaintext, non-SSL/https
connections that are passed through that node. The solution that seems
to be usually suggested is to always use
On Wed, Oct 6, 2010 at 8:57 PM, Load Bear loadbear...@gmail.com wrote:
I have also noticed that there exist some free VPN services which can be
used reasonably anonymously, such as ItsHidden. Thus, I was wondering -
is there an easy way to, for lack of a better description, chain
proxies, so
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 2010/10/06 11:02 PM, John Brooks wrote:
On Wed, Oct 6, 2010 at 8:57 PM, Load Bear loadbear...@gmail.com wrote:
I have also noticed that there exist some free VPN services which can be
used reasonably anonymously, such as ItsHidden. Thus, I was
On Wed, Oct 6, 2010 at 9:11 PM, Load Bear loadbear...@gmail.com wrote:
I am aware of that limitation. However, I am currently less concerned
about eavesdroppers between a given VPN and the destination than I am
about Tor exit-node eavesdroppers. Knowing the limitations involved, do
you know of
8 matches
Mail list logo