Embed Notice
HTML Code
Corresponding Notice
- Embed this notice@ins0mniak @phnt @SoylentGroyper
> right but you would own the tunnel.
while true, the vps/paas provider still sees the tcp or udp connection originating from your device and network. so if the operational model includes anonymity or pseudo-anonymity it's a no-go, since there's attribution.
> You could also torpedo it if necessary.
i'm not sure what torpedo is.
> Crypto is far from secure in that regard sure but id feel better about a set up like that over say...surfboard or something
sure, but really you might as well pay a few bucks with a credit card or virtual card if that's more convenient and buy the vps and route traffic through it.
unless you're trying to hide from governments and their law enforcement it's pretty solid. and if you are trying to hide from those it's going to take a giant cashpile to try to do so.