the way I see it any box outside of your physical control can not be trusted. 
On Jan 1, 2011, at 11:10 AM, Zate Berg wrote:

> Should they also have a strong policy about letting you violate their
> TOS and not taking action ? :-P
> 
> Your best bet if that is a requirement is to do a colo of a small
> server and don't give the colo access.  They are still going to have
> physical access of the system and the "man" could come knocking with a
> court order asking them to turn it over.
> 
> Unless you do something out of the US, your system is ALWAYS going to
> be at the mercy of the "man" getting  a court order and accessing your
> info.
> 
> I have toyed with the idea of creating a hosted system that logs to
> /dev/null and doesn't keep a single piece of information about who
> logged into the system from where, when.
> 
> cloudsigma.com are a pretty good "out of the us" cloud/VPS provider,
> you might try one of their cheaper tiers and setup your own.  If you
> might be engaging in activities that could get you in trouble, i would
> not trust a system built by anyone than yourself so you can be sure
> what it's logging, or not logging, and who has access.
> 
> Zate
> 
> 
> 
> On Fri, Dec 31, 2010 at 5:24 PM, xgermx <[email protected]> wrote:
>> Thanks for all of the input so far. Keep the suggestions coming.
>> <tinfoilhat>
>> Also, the ideal service provider should have a very strong policy about not
>> turning over my information if questioned. (rules out Amazon, etc)
>> </tinfoilhat>
>> 
>> 
>> On Thu, Dec 30, 2010 at 7:52 PM, Dan King <[email protected]> wrote:
>>> 
>>> If you use TOR as a transparent proxy, the speeds you get are much better.
>>> The circuits dont get constantly rebuilt.
>>> 
>>> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy
>>> You could run a TOR node on a VPS and use the VPS as your VPN
>>> concentrator. Then all traffic over the VPN could be then anonymized.
>>> I have no experience with any commercial VPN solutions that claim to mask
>>> your traffic. I'd be a little suspicious of that honestly.
>>> 
>>> On Thu, Dec 30, 2010 at 2:27 PM, Jim Halfpenny <[email protected]>
>>> wrote:
>>>> 
>>>> Hi,
>>>> Depends what your needs are. TOR offers anonymity at the expense of
>>>> speed. SSH tunneling provides point-to-point encryption, as does an
>>>> IPSec VPN e.g. FreeS/WAN. There are anonymiser services that offer web
>>>> proxies but don't encrypt your traffic. Your goals affect the choice
>>>> of solution best for you.
>>>> 
>>>> Jim
>>>> 
>>>> On 30 December 2010 14:41, xgermx <[email protected]> wrote:
>>>>> Can anyone give a recommendations for a private VPN service?
>>>>> My goal is to remain anonymous online whilst not sacrificing bandwidth.
>>>>> Something like IPREDator, possibly. https://www.ipredator.se/?lang=en
>>>>> Google searches for this have proved futile as most results are
>>>>> spam/seedy
>>>>> companies.
>>>>> TIA
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> Pauldotcom mailing list
>>>>> [email protected]
>>>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>>>>> Main Web Site: http://pauldotcom.com
>>>>> 
>>>> _______________________________________________
>>>> Pauldotcom mailing list
>>>> [email protected]
>>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>>>> Main Web Site: http://pauldotcom.com
>>> 
>>> 
>>> 
>>> --
>>> I live in a world of cold steel and dungeons and mighty foes...
>>> 
>>> _______________________________________________
>>> Pauldotcom mailing list
>>> [email protected]
>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>>> Main Web Site: http://pauldotcom.com
>> 
>> 
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>> 
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com

_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to