Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

some basics: -- always use a secure vpn (that is NOT just any vpn) -- always use high-end cryptography for the stream content on the vpn (like IPsec) -- look for a vpn provider that has absolutely nothing to do, work in, have equipment installed in, is a subsidiary of a company residing in the US, the UK and all its commonwealth dependencies, Canada, Australia and New Zealand. -- besides that, the vpn provider should also provide you with a voluntary connection (that is YOU holding the ONLY key in any encryption -- and the vpn provider should contractually commit to not having, maintaining for any purpose any logs of your connectivity -- always use that from a fully portable operating system (DVD or USB stick) like Tails -- use when possible also Tor (note that Tor traffic remains always visible and is not encrypted) for anonymity -- use an automated MAC spoofer -- always use PGP/GPG with RSA/RSA subkey set and 4096 bit keys

If you have accomplished all the above, you have a 'relatively' safe communications vehicle.

happy camping all.

and oh yeah if somebody on this medium operates a vpn service accomplishing all the minimum demands above for it, please make pr, cause your service is in high demand.



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: