-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- From what I have read, it is at least theoretically possible for someone
running a Tor exit node to monitor any plaintext, non-SSL/https
connections that are passed through that node. The solution that seems
to be usually suggested is to always use
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 2010/10/06 11:02 PM, John Brooks wrote:
On Wed, Oct 6, 2010 at 8:57 PM, Load Bear loadbear...@gmail.com wrote:
I have also noticed that there exist some free VPN services which can be
used reasonably anonymously, such as ItsHidden. Thus, I
2 matches
Mail list logo