Should they also have a strong policy about letting you violate their TOS and not taking action ? :-P
Your best bet if that is a requirement is to do a colo of a small server and don't give the colo access. They are still going to have physical access of the system and the "man" could come knocking with a court order asking them to turn it over. Unless you do something out of the US, your system is ALWAYS going to be at the mercy of the "man" getting a court order and accessing your info. I have toyed with the idea of creating a hosted system that logs to /dev/null and doesn't keep a single piece of information about who logged into the system from where, when. cloudsigma.com are a pretty good "out of the us" cloud/VPS provider, you might try one of their cheaper tiers and setup your own. If you might be engaging in activities that could get you in trouble, i would not trust a system built by anyone than yourself so you can be sure what it's logging, or not logging, and who has access. Zate On Fri, Dec 31, 2010 at 5:24 PM, xgermx <[email protected]> wrote: > Thanks for all of the input so far. Keep the suggestions coming. > <tinfoilhat> > Also, the ideal service provider should have a very strong policy about not > turning over my information if questioned. (rules out Amazon, etc) > </tinfoilhat> > > > On Thu, Dec 30, 2010 at 7:52 PM, Dan King <[email protected]> wrote: >> >> If you use TOR as a transparent proxy, the speeds you get are much better. >> The circuits dont get constantly rebuilt. >> >> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy >> You could run a TOR node on a VPS and use the VPS as your VPN >> concentrator. Then all traffic over the VPN could be then anonymized. >> I have no experience with any commercial VPN solutions that claim to mask >> your traffic. I'd be a little suspicious of that honestly. >> >> On Thu, Dec 30, 2010 at 2:27 PM, Jim Halfpenny <[email protected]> >> wrote: >>> >>> Hi, >>> Depends what your needs are. TOR offers anonymity at the expense of >>> speed. SSH tunneling provides point-to-point encryption, as does an >>> IPSec VPN e.g. FreeS/WAN. There are anonymiser services that offer web >>> proxies but don't encrypt your traffic. Your goals affect the choice >>> of solution best for you. >>> >>> Jim >>> >>> On 30 December 2010 14:41, xgermx <[email protected]> wrote: >>> > Can anyone give a recommendations for a private VPN service? >>> > My goal is to remain anonymous online whilst not sacrificing bandwidth. >>> > Something like IPREDator, possibly. https://www.ipredator.se/?lang=en >>> > Google searches for this have proved futile as most results are >>> > spam/seedy >>> > companies. >>> > TIA >>> > >>> > >>> > _______________________________________________ >>> > Pauldotcom mailing list >>> > [email protected] >>> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >>> > Main Web Site: http://pauldotcom.com >>> > >>> _______________________________________________ >>> Pauldotcom mailing list >>> [email protected] >>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >>> Main Web Site: http://pauldotcom.com >> >> >> >> -- >> I live in a world of cold steel and dungeons and mighty foes... >> >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com > > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
