Thanks all. I feel like WiTopia is the best fit based on my criteria and
budget. The ability to switch Gateways on-the-fly and the number/locations
of the Gateways is ideal for my intended use.
http://www.witopia.net/index.php/support/faq/#doyouissueus




On Sat, Jan 1, 2011 at 11:52 AM, Dan King <[email protected]> wrote:

> Completely agree with you carlos. Vps systems can be snooped on without
> your knowledge from the host.
>
> Id feel more comportable with a box at a physical location that I control
> running a tor proxy.
> On Jan 1, 2011 11:31 AM, "Carlos Perez" <[email protected]>
> wrote:
> >
> > the way I see it any box outside of your physical control can not be
> trusted.
> > On Jan 1, 2011, at 11:10 AM, Zate Berg wrote:
> >
> > > Should they also have a strong policy about letting you violate their
> > > TOS and not taking action ? :-P
> > >
> > > Your best bet if that is a requirement is to do a colo of a small
> > > server and don't give the colo access.  They are still going to have
> > > physical access of the system and the "man" could come knocking with a
> > > court order asking them to turn it over.
> > >
> > > Unless you do something out of the US, your system is ALWAYS going to
> > > be at the mercy of the "man" getting  a court order and accessing your
> > > info.
> > >
> > > I have toyed with the idea of creating a hosted system that logs to
> > > /dev/null and doesn't keep a single piece of information about who
> > > logged into the system from where, when.
> > >
> > > cloudsigma.com are a pretty good "out of the us" cloud/VPS provider,
> > > you might try one of their cheaper tiers and setup your own.  If you
> > > might be engaging in activities that could get you in trouble, i would
> > > not trust a system built by anyone than yourself so you can be sure
> > > what it's logging, or not logging, and who has access.
> > >
> > > Zate
> > >
> > >
> > >
> > > On Fri, Dec 31, 2010 at 5:24 PM, xgermx <[email protected]> wrote:
> > >> Thanks for all of the input so far. Keep the suggestions coming.
> > >> <tinfoilhat>
> > >> Also, the ideal service provider should have a very strong policy
> about not
> > >> turning over my information if questioned. (rules out Amazon, etc)
> > >> </tinfoilhat>
> > >>
> > >>
> > >> On Thu, Dec 30, 2010 at 7:52 PM, Dan King <[email protected]>
> wrote:
> > >>>
> > >>> If you use TOR as a transparent proxy, the speeds you get are much
> better.
> > >>> The circuits dont get constantly rebuilt.
> > >>>
> > >>>
> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy
> > >>> You could run a TOR node on a VPS and use the VPS as your VPN
> > >>> concentrator. Then all traffic over the VPN could be then anonymized.
> > >>> I have no experience with any commercial VPN solutions that claim to
> mask
> > >>> your traffic. I'd be a little suspicious of that honestly.
> > >>>
> > >>> On Thu, Dec 30, 2010 at 2:27 PM, Jim Halfpenny <
> [email protected]>
> > >>> wrote:
> > >>>>
> > >>>> Hi,
> > >>>> Depends what your needs are. TOR offers anonymity at the expense of
> > >>>> speed. SSH tunneling provides point-to-point encryption, as does an
> > >>>> IPSec VPN e.g. FreeS/WAN. There are anonymiser services that offer
> web
> > >>>> proxies but don't encrypt your traffic. Your goals affect the choice
> > >>>> of solution best for you.
> > >>>>
> > >>>> Jim
> > >>>>
> > >>>> On 30 December 2010 14:41, xgermx <[email protected]> wrote:
> > >>>>> Can anyone give a recommendations for a private VPN service?
> > >>>>> My goal is to remain anonymous online whilst not sacrificing
> bandwidth.
> > >>>>> Something like IPREDator, possibly.
> https://www.ipredator.se/?lang=en
> > >>>>> Google searches for this have proved futile as most results are
> > >>>>> spam/seedy
> > >>>>> companies.
> > >>>>> TIA
> > >>>>>
> > >>>>>
> > >>>>> _______________________________________________
> > >>>>> Pauldotcom mailing list
> > >>>>> [email protected]
> > >>>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> > >>>>> Main Web Site: http://pauldotcom.com
> > >>>>>
> > >>>> _______________________________________________
> > >>>> Pauldotcom mailing list
> > >>>> [email protected]
> > >>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> > >>>> Main Web Site: http://pauldotcom.com
> > >>>
> > >>>
> > >>>
> > >>> --
> > >>> I live in a world of cold steel and dungeons and mighty foes...
> > >>>
> > >>> _______________________________________________
> > >>> Pauldotcom mailing list
> > >>> [email protected]
> > >>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> > >>> Main Web Site: http://pauldotcom.com
> > >>
> > >>
> > >> _______________________________________________
> > >> Pauldotcom mailing list
> > >> [email protected]
> > >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> > >> Main Web Site: http://pauldotcom.com
> > >>
> > > _______________________________________________
> > > Pauldotcom mailing list
> > > [email protected]
> > > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> > > Main Web Site: http://pauldotcom.com
> >
> > _______________________________________________
> > Pauldotcom mailing list
> > [email protected]
> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> > Main Web Site: http://pauldotcom.com
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to