I knew I had this laying around somewhere.  I can't personally vouch for any
of these but it's a list to look at :)

http://www.pentestit.com/2010/05/19/list-free-vpn-providers/

Colin Vallance
b0o

On Sat, Jan 1, 2011 at 12:52 PM, Zate Berg <[email protected]> wrote:

> Thats not going to be feasible for most people though.  Unless you run
> something from A) Home, B) Work, you aren't really going to have full
> physical control over it and if you do either of those, you compromise
> your anonymity.
>
> I think the closest you can get is a machine only you have root on,
> that you connect to via an encrypted tunnel, that does not log your
> connections and anonymizes your traffic (tor).  Still going to be
> susceptible to snooping on inbound connections to see where they
> originated from and all that jazz.
>
> There really is no cheap way to be securely anonymous and avoid
> detection if the people you are pissing off have access to the
> physical network around your box.
>
> Really comes down to what you want it for.  If it's just a way to stay
> anonymous on the net to protect yourself, I think EC2 / no logging /
> ssh to proxy is just fine.  I use one of those all the time.
>
> Zate
>
>
>
> On Sat, Jan 1, 2011 at 12:52 PM, Dan King <[email protected]> wrote:
> > Completely agree with you carlos. Vps systems can be snooped on without
> your
> > knowledge from the host.
> >
> > Id feel more comportable with a box at a physical location that I control
> > running a tor proxy.
> >
> > On Jan 1, 2011 11:31 AM, "Carlos Perez" <[email protected]>
> > wrote:
> >>
> >> the way I see it any box outside of your physical control can not be
> >> trusted.
> >> On Jan 1, 2011, at 11:10 AM, Zate Berg wrote:
> >>
> >> > Should they also have a strong policy about letting you violate their
> >> > TOS and not taking action ? :-P
> >> >
> >> > Your best bet if that is a requirement is to do a colo of a small
> >> > server and don't give the colo access.  They are still going to have
> >> > physical access of the system and the "man" could come knocking with a
> >> > court order asking them to turn it over.
> >> >
> >> > Unless you do something out of the US, your system is ALWAYS going to
> >> > be at the mercy of the "man" getting  a court order and accessing your
> >> > info.
> >> >
> >> > I have toyed with the idea of creating a hosted system that logs to
> >> > /dev/null and doesn't keep a single piece of information about who
> >> > logged into the system from where, when.
> >> >
> >> > cloudsigma.com are a pretty good "out of the us" cloud/VPS provider,
> >> > you might try one of their cheaper tiers and setup your own.  If you
> >> > might be engaging in activities that could get you in trouble, i would
> >> > not trust a system built by anyone than yourself so you can be sure
> >> > what it's logging, or not logging, and who has access.
> >> >
> >> > Zate
> >> >
> >> >
> >> >
> >> > On Fri, Dec 31, 2010 at 5:24 PM, xgermx <[email protected]> wrote:
> >> >> Thanks for all of the input so far. Keep the suggestions coming.
> >> >> <tinfoilhat>
> >> >> Also, the ideal service provider should have a very strong policy
> about
> >> >> not
> >> >> turning over my information if questioned. (rules out Amazon, etc)
> >> >> </tinfoilhat>
> >> >>
> >> >>
> >> >> On Thu, Dec 30, 2010 at 7:52 PM, Dan King <[email protected]>
> >> >> wrote:
> >> >>>
> >> >>> If you use TOR as a transparent proxy, the speeds you get are much
> >> >>> better.
> >> >>> The circuits dont get constantly rebuilt.
> >> >>>
> >> >>>
> >> >>>
> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy
> >> >>> You could run a TOR node on a VPS and use the VPS as your VPN
> >> >>> concentrator. Then all traffic over the VPN could be then
> anonymized.
> >> >>> I have no experience with any commercial VPN solutions that claim to
> >> >>> mask
> >> >>> your traffic. I'd be a little suspicious of that honestly.
> >> >>>
> >> >>> On Thu, Dec 30, 2010 at 2:27 PM, Jim Halfpenny
> >> >>> <[email protected]>
> >> >>> wrote:
> >> >>>>
> >> >>>> Hi,
> >> >>>> Depends what your needs are. TOR offers anonymity at the expense of
> >> >>>> speed. SSH tunneling provides point-to-point encryption, as does an
> >> >>>> IPSec VPN e.g. FreeS/WAN. There are anonymiser services that offer
> >> >>>> web
> >> >>>> proxies but don't encrypt your traffic. Your goals affect the
> choice
> >> >>>> of solution best for you.
> >> >>>>
> >> >>>> Jim
> >> >>>>
> >> >>>> On 30 December 2010 14:41, xgermx <[email protected]> wrote:
> >> >>>>> Can anyone give a recommendations for a private VPN service?
> >> >>>>> My goal is to remain anonymous online whilst not sacrificing
> >> >>>>> bandwidth.
> >> >>>>> Something like IPREDator, possibly.
> >> >>>>> https://www.ipredator.se/?lang=en
> >> >>>>> Google searches for this have proved futile as most results are
> >> >>>>> spam/seedy
> >> >>>>> companies.
> >> >>>>> TIA
> >> >>>>>
> >> >>>>>
> >> >>>>> _______________________________________________
> >> >>>>> Pauldotcom mailing list
> >> >>>>> [email protected]
> >> >>>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> >> >>>>> Main Web Site: http://pauldotcom.com
> >> >>>>>
> >> >>>> _______________________________________________
> >> >>>> Pauldotcom mailing list
> >> >>>> [email protected]
> >> >>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> >> >>>> Main Web Site: http://pauldotcom.com
> >> >>>
> >> >>>
> >> >>>
> >> >>> --
> >> >>> I live in a world of cold steel and dungeons and mighty foes...
> >> >>>
> >> >>> _______________________________________________
> >> >>> Pauldotcom mailing list
> >> >>> [email protected]
> >> >>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> >> >>> Main Web Site: http://pauldotcom.com
> >> >>
> >> >>
> >> >> _______________________________________________
> >> >> Pauldotcom mailing list
> >> >> [email protected]
> >> >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> >> >> Main Web Site: http://pauldotcom.com
> >> >>
> >> > _______________________________________________
> >> > Pauldotcom mailing list
> >> > [email protected]
> >> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> >> > Main Web Site: http://pauldotcom.com
> >>
> >> _______________________________________________
> >> Pauldotcom mailing list
> >> [email protected]
> >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> >> Main Web Site: http://pauldotcom.com
> >
> > _______________________________________________
> > Pauldotcom mailing list
> > [email protected]
> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> > Main Web Site: http://pauldotcom.com
> >
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to