Should they also have a strong policy about letting you violate their
TOS and not taking action ? :-P

Your best bet if that is a requirement is to do a colo of a small
server and don't give the colo access.  They are still going to have
physical access of the system and the "man" could come knocking with a
court order asking them to turn it over.

Unless you do something out of the US, your system is ALWAYS going to
be at the mercy of the "man" getting  a court order and accessing your
info.

I have toyed with the idea of creating a hosted system that logs to
/dev/null and doesn't keep a single piece of information about who
logged into the system from where, when.

cloudsigma.com are a pretty good "out of the us" cloud/VPS provider,
you might try one of their cheaper tiers and setup your own.  If you
might be engaging in activities that could get you in trouble, i would
not trust a system built by anyone than yourself so you can be sure
what it's logging, or not logging, and who has access.

Zate



On Fri, Dec 31, 2010 at 5:24 PM, xgermx <[email protected]> wrote:
> Thanks for all of the input so far. Keep the suggestions coming.
> <tinfoilhat>
> Also, the ideal service provider should have a very strong policy about not
> turning over my information if questioned. (rules out Amazon, etc)
> </tinfoilhat>
>
>
> On Thu, Dec 30, 2010 at 7:52 PM, Dan King <[email protected]> wrote:
>>
>> If you use TOR as a transparent proxy, the speeds you get are much better.
>> The circuits dont get constantly rebuilt.
>>
>> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy
>> You could run a TOR node on a VPS and use the VPS as your VPN
>> concentrator. Then all traffic over the VPN could be then anonymized.
>> I have no experience with any commercial VPN solutions that claim to mask
>> your traffic. I'd be a little suspicious of that honestly.
>>
>> On Thu, Dec 30, 2010 at 2:27 PM, Jim Halfpenny <[email protected]>
>> wrote:
>>>
>>> Hi,
>>> Depends what your needs are. TOR offers anonymity at the expense of
>>> speed. SSH tunneling provides point-to-point encryption, as does an
>>> IPSec VPN e.g. FreeS/WAN. There are anonymiser services that offer web
>>> proxies but don't encrypt your traffic. Your goals affect the choice
>>> of solution best for you.
>>>
>>> Jim
>>>
>>> On 30 December 2010 14:41, xgermx <[email protected]> wrote:
>>> > Can anyone give a recommendations for a private VPN service?
>>> > My goal is to remain anonymous online whilst not sacrificing bandwidth.
>>> > Something like IPREDator, possibly. https://www.ipredator.se/?lang=en
>>> > Google searches for this have proved futile as most results are
>>> > spam/seedy
>>> > companies.
>>> > TIA
>>> >
>>> >
>>> > _______________________________________________
>>> > Pauldotcom mailing list
>>> > [email protected]
>>> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>>> > Main Web Site: http://pauldotcom.com
>>> >
>>> _______________________________________________
>>> Pauldotcom mailing list
>>> [email protected]
>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>>> Main Web Site: http://pauldotcom.com
>>
>>
>>
>> --
>> I live in a world of cold steel and dungeons and mighty foes...
>>
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to