securecomms
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
securecomms [2023/04/12 12:36] – kc | securecomms [2023/04/14 23:40] – kc | ||
---|---|---|---|
Line 22: | Line 22: | ||
It may be desirable to register for some services using a " | It may be desirable to register for some services using a " | ||
+ | ---- | ||
+ | An attempt to [[TOR-VPN-Etc|Unsnarl TOR and related security issues]]. | ||
+ | |||
---- | ---- | ||
Line 44: | Line 47: | ||
Wikipedia records that US security organizations have issued warnings about the potential misuses of this system for illegal actions. See: | Wikipedia records that US security organizations have issued warnings about the potential misuses of this system for illegal actions. See: | ||
[[https:// | [[https:// | ||
+ | |||
+ | The use of TOR is not a perfect solution, but those with extreme security situations should | ||
+ | learn about it. See: [[https:// | ||
+ | Tails]] | ||
[[https:// | [[https:// | ||
- | Running an instance of Ubuntu on your computer' | + | Running an instance of Ubuntu on your computer' |
+ | you were using a good VPN your communications would still trace back to the point at which you went on-line. | ||
See: [[https:// | See: [[https:// |
securecomms.txt · Last modified: 2023/05/04 18:19 by kc