Quote:
Originally Posted by Stuart
Tor is only as trustworthy as the endpoint you are connected to. Not all of the people who run these are honest.
Tor will not help you, and depending on the how honest the owner of the endpoint is, may actually hinder you.
Assuming the info I have given is correct.
|
Well it's the best of the both, nor in a public system but not a easy position to track. Either way it makes the net that much more secure, to the concerned surfers (net) out there. There is another system out there, frost using freenet ver: 5 or 7 which to date hasn't been traceable with all the LEA has to offer.. Any takers?
(LEA's worst nightmare + true script pw'd encripted hd drive)
link:
http://freenetproject.org/
(download, run it then down load XML package for the sites you want to link up to - up to 24hr set up)
Quote:
Originally Posted by Stuart
Actually, no. It won't. I have disabled bluetooth on it as I have no need for it, and it's just wasting battery power.
|
Thats good to know, as I don't know many that have - they trust too much their over priced phone too much.
But all things mobile in general are/have always been the first port of call to tap or listen into for intelligence then other things, GCHQ comes to mind.
Mind me asking Stuart, you run a wireless/wired network?
You seam to me you run a the safer option (wired) though do tell me if you wish. I ask a there are the second best way to tap into a persons life beside the weak mobile phone no matter how much you pay for it! Plus in the UK the owner is solely responsible for it use now days, even they didn't do anything > illegal or legal

They get the full weight of law against them.
Happy talking to you Stuart
Toonlight