Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On 02/18/2011 01:45 PM, Matthew Gillen wrote: > On 02/18/2011 01:27 PM, John Boland wrote: >> i can see that this is very handy for folks wishing to anonymize their web >> activities. whether to avoid government interference or something more >> nefarious. >> how does this effectively differ from the ipredator service ( >> https://www.ipredator.se/?lang=en) offered by the pirate bay? this service >> creates a vpn tunnel from your machine to their servers and then nat's your >> activities. There's also the fact that a VPN-based solution is far easier (for say, an ISP) to block (e.g. firewall-block a single destination IP) than Tor: blocking Tor would require deep-packet inspection, since the nodes involved in the network are not static. Matt
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |