On 14 Apr 2014 at 8:28, Andrew S. Baker wrote: > Your traffic goes through their infrastructure no matter how you look at it, > so unless you're planning on encrypting every single packet that leaves your > network before it gets to theirs, then you've left them with snooping > opportunities.
Can you say "Tor", boys and girls? I use Tor on my home machine for a lot of my "recreational" browsing. For technical and business work I don't bother. I use Orbot on my Android phone for all my Firefox browsing. It slows my browser but I am willing to tolerate the slowness. -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/

