I knew I had this laying around somewhere. I can't personally vouch for any of these but it's a list to look at :)
http://www.pentestit.com/2010/05/19/list-free-vpn-providers/ Colin Vallance b0o On Sat, Jan 1, 2011 at 12:52 PM, Zate Berg <[email protected]> wrote: > Thats not going to be feasible for most people though. Unless you run > something from A) Home, B) Work, you aren't really going to have full > physical control over it and if you do either of those, you compromise > your anonymity. > > I think the closest you can get is a machine only you have root on, > that you connect to via an encrypted tunnel, that does not log your > connections and anonymizes your traffic (tor). Still going to be > susceptible to snooping on inbound connections to see where they > originated from and all that jazz. > > There really is no cheap way to be securely anonymous and avoid > detection if the people you are pissing off have access to the > physical network around your box. > > Really comes down to what you want it for. If it's just a way to stay > anonymous on the net to protect yourself, I think EC2 / no logging / > ssh to proxy is just fine. I use one of those all the time. > > Zate > > > > On Sat, Jan 1, 2011 at 12:52 PM, Dan King <[email protected]> wrote: > > Completely agree with you carlos. Vps systems can be snooped on without > your > > knowledge from the host. > > > > Id feel more comportable with a box at a physical location that I control > > running a tor proxy. > > > > On Jan 1, 2011 11:31 AM, "Carlos Perez" <[email protected]> > > wrote: > >> > >> the way I see it any box outside of your physical control can not be > >> trusted. > >> On Jan 1, 2011, at 11:10 AM, Zate Berg wrote: > >> > >> > Should they also have a strong policy about letting you violate their > >> > TOS and not taking action ? :-P > >> > > >> > Your best bet if that is a requirement is to do a colo of a small > >> > server and don't give the colo access. They are still going to have > >> > physical access of the system and the "man" could come knocking with a > >> > court order asking them to turn it over. > >> > > >> > Unless you do something out of the US, your system is ALWAYS going to > >> > be at the mercy of the "man" getting a court order and accessing your > >> > info. > >> > > >> > I have toyed with the idea of creating a hosted system that logs to > >> > /dev/null and doesn't keep a single piece of information about who > >> > logged into the system from where, when. > >> > > >> > cloudsigma.com are a pretty good "out of the us" cloud/VPS provider, > >> > you might try one of their cheaper tiers and setup your own. If you > >> > might be engaging in activities that could get you in trouble, i would > >> > not trust a system built by anyone than yourself so you can be sure > >> > what it's logging, or not logging, and who has access. > >> > > >> > Zate > >> > > >> > > >> > > >> > On Fri, Dec 31, 2010 at 5:24 PM, xgermx <[email protected]> wrote: > >> >> Thanks for all of the input so far. Keep the suggestions coming. > >> >> <tinfoilhat> > >> >> Also, the ideal service provider should have a very strong policy > about > >> >> not > >> >> turning over my information if questioned. (rules out Amazon, etc) > >> >> </tinfoilhat> > >> >> > >> >> > >> >> On Thu, Dec 30, 2010 at 7:52 PM, Dan King <[email protected]> > >> >> wrote: > >> >>> > >> >>> If you use TOR as a transparent proxy, the speeds you get are much > >> >>> better. > >> >>> The circuits dont get constantly rebuilt. > >> >>> > >> >>> > >> >>> > https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy > >> >>> You could run a TOR node on a VPS and use the VPS as your VPN > >> >>> concentrator. Then all traffic over the VPN could be then > anonymized. > >> >>> I have no experience with any commercial VPN solutions that claim to > >> >>> mask > >> >>> your traffic. I'd be a little suspicious of that honestly. > >> >>> > >> >>> On Thu, Dec 30, 2010 at 2:27 PM, Jim Halfpenny > >> >>> <[email protected]> > >> >>> wrote: > >> >>>> > >> >>>> Hi, > >> >>>> Depends what your needs are. TOR offers anonymity at the expense of > >> >>>> speed. SSH tunneling provides point-to-point encryption, as does an > >> >>>> IPSec VPN e.g. FreeS/WAN. There are anonymiser services that offer > >> >>>> web > >> >>>> proxies but don't encrypt your traffic. Your goals affect the > choice > >> >>>> of solution best for you. > >> >>>> > >> >>>> Jim > >> >>>> > >> >>>> On 30 December 2010 14:41, xgermx <[email protected]> wrote: > >> >>>>> Can anyone give a recommendations for a private VPN service? > >> >>>>> My goal is to remain anonymous online whilst not sacrificing > >> >>>>> bandwidth. > >> >>>>> Something like IPREDator, possibly. > >> >>>>> https://www.ipredator.se/?lang=en > >> >>>>> Google searches for this have proved futile as most results are > >> >>>>> spam/seedy > >> >>>>> companies. > >> >>>>> TIA > >> >>>>> > >> >>>>> > >> >>>>> _______________________________________________ > >> >>>>> Pauldotcom mailing list > >> >>>>> [email protected] > >> >>>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > >> >>>>> Main Web Site: http://pauldotcom.com > >> >>>>> > >> >>>> _______________________________________________ > >> >>>> Pauldotcom mailing list > >> >>>> [email protected] > >> >>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > >> >>>> Main Web Site: http://pauldotcom.com > >> >>> > >> >>> > >> >>> > >> >>> -- > >> >>> I live in a world of cold steel and dungeons and mighty foes... > >> >>> > >> >>> _______________________________________________ > >> >>> Pauldotcom mailing list > >> >>> [email protected] > >> >>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > >> >>> Main Web Site: http://pauldotcom.com > >> >> > >> >> > >> >> _______________________________________________ > >> >> Pauldotcom mailing list > >> >> [email protected] > >> >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > >> >> Main Web Site: http://pauldotcom.com > >> >> > >> > _______________________________________________ > >> > Pauldotcom mailing list > >> > [email protected] > >> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > >> > Main Web Site: http://pauldotcom.com > >> > >> _______________________________________________ > >> Pauldotcom mailing list > >> [email protected] > >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > >> Main Web Site: http://pauldotcom.com > > > > _______________________________________________ > > Pauldotcom mailing list > > [email protected] > > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > > Main Web Site: http://pauldotcom.com > > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
