Completely agree with you carlos. Vps systems can be snooped on without your knowledge from the host.
Id feel more comportable with a box at a physical location that I control running a tor proxy. On Jan 1, 2011 11:31 AM, "Carlos Perez" <[email protected]> wrote: > > the way I see it any box outside of your physical control can not be trusted. > On Jan 1, 2011, at 11:10 AM, Zate Berg wrote: > > > Should they also have a strong policy about letting you violate their > > TOS and not taking action ? :-P > > > > Your best bet if that is a requirement is to do a colo of a small > > server and don't give the colo access. They are still going to have > > physical access of the system and the "man" could come knocking with a > > court order asking them to turn it over. > > > > Unless you do something out of the US, your system is ALWAYS going to > > be at the mercy of the "man" getting a court order and accessing your > > info. > > > > I have toyed with the idea of creating a hosted system that logs to > > /dev/null and doesn't keep a single piece of information about who > > logged into the system from where, when. > > > > cloudsigma.com are a pretty good "out of the us" cloud/VPS provider, > > you might try one of their cheaper tiers and setup your own. If you > > might be engaging in activities that could get you in trouble, i would > > not trust a system built by anyone than yourself so you can be sure > > what it's logging, or not logging, and who has access. > > > > Zate > > > > > > > > On Fri, Dec 31, 2010 at 5:24 PM, xgermx <[email protected]> wrote: > >> Thanks for all of the input so far. Keep the suggestions coming. > >> <tinfoilhat> > >> Also, the ideal service provider should have a very strong policy about not > >> turning over my information if questioned. (rules out Amazon, etc) > >> </tinfoilhat> > >> > >> > >> On Thu, Dec 30, 2010 at 7:52 PM, Dan King <[email protected]> wrote: > >>> > >>> If you use TOR as a transparent proxy, the speeds you get are much better. > >>> The circuits dont get constantly rebuilt. > >>> > >>> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy > >>> You could run a TOR node on a VPS and use the VPS as your VPN > >>> concentrator. Then all traffic over the VPN could be then anonymized. > >>> I have no experience with any commercial VPN solutions that claim to mask > >>> your traffic. I'd be a little suspicious of that honestly. > >>> > >>> On Thu, Dec 30, 2010 at 2:27 PM, Jim Halfpenny < [email protected]> > >>> wrote: > >>>> > >>>> Hi, > >>>> Depends what your needs are. TOR offers anonymity at the expense of > >>>> speed. SSH tunneling provides point-to-point encryption, as does an > >>>> IPSec VPN e.g. FreeS/WAN. There are anonymiser services that offer web > >>>> proxies but don't encrypt your traffic. Your goals affect the choice > >>>> of solution best for you. > >>>> > >>>> Jim > >>>> > >>>> On 30 December 2010 14:41, xgermx <[email protected]> wrote: > >>>>> Can anyone give a recommendations for a private VPN service? > >>>>> My goal is to remain anonymous online whilst not sacrificing bandwidth. > >>>>> Something like IPREDator, possibly. https://www.ipredator.se/?lang=en > >>>>> Google searches for this have proved futile as most results are > >>>>> spam/seedy > >>>>> companies. > >>>>> TIA > >>>>> > >>>>> > >>>>> _______________________________________________ > >>>>> Pauldotcom mailing list > >>>>> [email protected] > >>>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > >>>>> Main Web Site: http://pauldotcom.com > >>>>> > >>>> _______________________________________________ > >>>> Pauldotcom mailing list > >>>> [email protected] > >>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > >>>> Main Web Site: http://pauldotcom.com > >>> > >>> > >>> > >>> -- > >>> I live in a world of cold steel and dungeons and mighty foes... > >>> > >>> _______________________________________________ > >>> Pauldotcom mailing list > >>> [email protected] > >>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > >>> Main Web Site: http://pauldotcom.com > >> > >> > >> _______________________________________________ > >> Pauldotcom mailing list > >> [email protected] > >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > >> Main Web Site: http://pauldotcom.com > >> > > _______________________________________________ > > Pauldotcom mailing list > > [email protected] > > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > > Main Web Site: http://pauldotcom.com > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
