Thats not going to be feasible for most people though.  Unless you run
something from A) Home, B) Work, you aren't really going to have full
physical control over it and if you do either of those, you compromise
your anonymity.

I think the closest you can get is a machine only you have root on,
that you connect to via an encrypted tunnel, that does not log your
connections and anonymizes your traffic (tor).  Still going to be
susceptible to snooping on inbound connections to see where they
originated from and all that jazz.

There really is no cheap way to be securely anonymous and avoid
detection if the people you are pissing off have access to the
physical network around your box.

Really comes down to what you want it for.  If it's just a way to stay
anonymous on the net to protect yourself, I think EC2 / no logging /
ssh to proxy is just fine.  I use one of those all the time.

Zate



On Sat, Jan 1, 2011 at 12:52 PM, Dan King <[email protected]> wrote:
> Completely agree with you carlos. Vps systems can be snooped on without your
> knowledge from the host.
>
> Id feel more comportable with a box at a physical location that I control
> running a tor proxy.
>
> On Jan 1, 2011 11:31 AM, "Carlos Perez" <[email protected]>
> wrote:
>>
>> the way I see it any box outside of your physical control can not be
>> trusted.
>> On Jan 1, 2011, at 11:10 AM, Zate Berg wrote:
>>
>> > Should they also have a strong policy about letting you violate their
>> > TOS and not taking action ? :-P
>> >
>> > Your best bet if that is a requirement is to do a colo of a small
>> > server and don't give the colo access.  They are still going to have
>> > physical access of the system and the "man" could come knocking with a
>> > court order asking them to turn it over.
>> >
>> > Unless you do something out of the US, your system is ALWAYS going to
>> > be at the mercy of the "man" getting  a court order and accessing your
>> > info.
>> >
>> > I have toyed with the idea of creating a hosted system that logs to
>> > /dev/null and doesn't keep a single piece of information about who
>> > logged into the system from where, when.
>> >
>> > cloudsigma.com are a pretty good "out of the us" cloud/VPS provider,
>> > you might try one of their cheaper tiers and setup your own.  If you
>> > might be engaging in activities that could get you in trouble, i would
>> > not trust a system built by anyone than yourself so you can be sure
>> > what it's logging, or not logging, and who has access.
>> >
>> > Zate
>> >
>> >
>> >
>> > On Fri, Dec 31, 2010 at 5:24 PM, xgermx <[email protected]> wrote:
>> >> Thanks for all of the input so far. Keep the suggestions coming.
>> >> <tinfoilhat>
>> >> Also, the ideal service provider should have a very strong policy about
>> >> not
>> >> turning over my information if questioned. (rules out Amazon, etc)
>> >> </tinfoilhat>
>> >>
>> >>
>> >> On Thu, Dec 30, 2010 at 7:52 PM, Dan King <[email protected]>
>> >> wrote:
>> >>>
>> >>> If you use TOR as a transparent proxy, the speeds you get are much
>> >>> better.
>> >>> The circuits dont get constantly rebuilt.
>> >>>
>> >>>
>> >>> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy
>> >>> You could run a TOR node on a VPS and use the VPS as your VPN
>> >>> concentrator. Then all traffic over the VPN could be then anonymized.
>> >>> I have no experience with any commercial VPN solutions that claim to
>> >>> mask
>> >>> your traffic. I'd be a little suspicious of that honestly.
>> >>>
>> >>> On Thu, Dec 30, 2010 at 2:27 PM, Jim Halfpenny
>> >>> <[email protected]>
>> >>> wrote:
>> >>>>
>> >>>> Hi,
>> >>>> Depends what your needs are. TOR offers anonymity at the expense of
>> >>>> speed. SSH tunneling provides point-to-point encryption, as does an
>> >>>> IPSec VPN e.g. FreeS/WAN. There are anonymiser services that offer
>> >>>> web
>> >>>> proxies but don't encrypt your traffic. Your goals affect the choice
>> >>>> of solution best for you.
>> >>>>
>> >>>> Jim
>> >>>>
>> >>>> On 30 December 2010 14:41, xgermx <[email protected]> wrote:
>> >>>>> Can anyone give a recommendations for a private VPN service?
>> >>>>> My goal is to remain anonymous online whilst not sacrificing
>> >>>>> bandwidth.
>> >>>>> Something like IPREDator, possibly.
>> >>>>> https://www.ipredator.se/?lang=en
>> >>>>> Google searches for this have proved futile as most results are
>> >>>>> spam/seedy
>> >>>>> companies.
>> >>>>> TIA
>> >>>>>
>> >>>>>
>> >>>>> _______________________________________________
>> >>>>> Pauldotcom mailing list
>> >>>>> [email protected]
>> >>>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> >>>>> Main Web Site: http://pauldotcom.com
>> >>>>>
>> >>>> _______________________________________________
>> >>>> Pauldotcom mailing list
>> >>>> [email protected]
>> >>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> >>>> Main Web Site: http://pauldotcom.com
>> >>>
>> >>>
>> >>>
>> >>> --
>> >>> I live in a world of cold steel and dungeons and mighty foes...
>> >>>
>> >>> _______________________________________________
>> >>> Pauldotcom mailing list
>> >>> [email protected]
>> >>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> >>> Main Web Site: http://pauldotcom.com
>> >>
>> >>
>> >> _______________________________________________
>> >> Pauldotcom mailing list
>> >> [email protected]
>> >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> >> Main Web Site: http://pauldotcom.com
>> >>
>> > _______________________________________________
>> > Pauldotcom mailing list
>> > [email protected]
>> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> > Main Web Site: http://pauldotcom.com
>>
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to