I've been lurking for the past decade or so. Now I need to recommend
Circumvention Technology to be used in a new "denied area".

Can anybody recommend non-compromised firewalls, VPNs, data encryption,
secure data storage, etc for folks in a denied area? Any recommended
tactics, techniques, and procedures manuals? Policies?

Very Respectfully,

Joel Harding
-- 
Joel Harding
http://toinformistoinfluence.com
(703) 362-8582
-- 
Liberationtech is public & archives are searchable from any major commercial 
search engine. Violations of list guidelines will get you moderated: 
https://lists.ghserv.net/mailman/listinfo/lt. Unsubscribe, change to digest 
mode, or change password by emailing [email protected].

Reply via email to