some basics:
-- always use a secure vpn (that is NOT just any vpn)
-- always use high-end cryptography for the stream content on the vpn (like IPsec)
-- look for a vpn provider that has absolutely nothing to do, work in, have equipment installed in, is a subsidiary of a company residing in the US, the UK and all its commonwealth dependencies, Canada, Australia and New Zealand.
-- besides that, the vpn provider should also provide you with a voluntary connection (that is YOU holding the ONLY key in any encryption
-- and the vpn provider should contractually commit to not having, maintaining for any purpose any logs of your connectivity
-- always use that from a fully portable operating system (DVD or USB stick) like Tails
-- use when possible also Tor (note that Tor traffic remains always visible and is not encrypted) for anonymity
-- use an automated MAC spoofer
-- always use PGP/GPG with RSA/RSA subkey set and 4096 bit keys
If you have accomplished all the above, you have a 'relatively' safe communications vehicle.
happy camping all.
and oh yeah if somebody on this medium operates a vpn service accomplishing all the minimum demands above for it, please make pr, cause your service is in high demand.
If you have accomplished all the above, you have a 'relatively' safe communications vehicle.
happy camping all.
and oh yeah if somebody on this medium operates a vpn service accomplishing all the minimum demands above for it, please make pr, cause your service is in high demand.