-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Flipchan <[email protected]>:
> Well i never liked vpn , like for example in the US the police can force > the vpn provider to give out info without the vpn provider telling the > client/customer about it, so u need to put alot of trust in these vpn > providers, That's why I would never purchase a US-based VPN... > i am acctually developing a better solution but its only in beta and i > havent got it to work 100% Could you share some more info on that? Will it work in real time? How will you address correlation attacks? > is this person who is hosting my vpn ready to go to jail for me? Definitely not, that's why I was thinking of a VPN in a jurisdiction that allows keeping no logs. But even if a VPN provider keeps no logs (and even if I trust them, and as HideMyAss case shows, it can be dangerous), I think that if government in any country wanted to tap into traffic in a datacentre where this VPN provider hosts some of its servers, it wouldn't be too hard for them to do so. > u need a non US provider and some u trust I trust Tor way more than I trust a VPN provider... - -- Oskar Wendel, [email protected] Pubkey: https://pgp.mit.edu/pks/lookup?search=0x6690CC52318DB84C Fingerprint: C8C4 B75C BB72 36FB 94B4 925C 6690 CC52 318D B84C -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJWpUmZAAoJEGaQzFIxjbhMtgYH/2rIdHcu1MBnv+whPTndiiEM 7Ulpm0oArJZ6FuR3lEykH/cD2TXPepUx5IakO8SrMtAH0nWw5Mrap3UBzfLc+iAz 8xYLl52uv4hZDuIvWcv4FFqNlwhvJTQ0XJwyVKhIWDjmmsEHQe3ddFPFeExss3w2 +EF8VEbAGnh1s4a46njPU7M4b0YvGnhp6TsUigYX3EdP426cNsMyWAKLzlL5Ts7e 6ciRzTdUtlwRzAvkOShDQMxota6BAbtTHxBRlIcBXvbA3GRW025apn5PEoP39BdH EBxwAYkS02HVNAlkK+DyKd9xtXrt6TiXWWo4rA5knwhUP3gChmHpWlI/qedcW/s= =7q2d -----END PGP SIGNATURE----- -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
