They do. But we aren't offering them publicly (yet), mostly word of mouth. Some services we offer include dns protection, bulletproof hosting,...
In addition to me demonstrating that the Tor Project has control over the network as we do, here is something to think about: How does the Tor...
Tentatively. Anonymity isn't a state without reference. It is a question of whom you are anonymous *from*. But I think you'll like discussing...
Intro below. Full document downloadable from Cryptohippie. The Electronic Police State 2010 National Rankings The USA closes - only...
Sure. By default you get the first 30 days for $1. But message me off list and I'll generate a temp account for you.
No matter what they do, it is only per session because it is read-only. And then it gets worse for the attacker: the sandbox system is a hardened...
No, XeroBank is not vulnerable to that type of attack for many reasons, mainly because we are a private network. Tor has a large attack landscape...
i give a small explanation here.
Please see the thread title, it is about Tor. If you have xb questions, that should be moved to a different thread. Actually, I've answered...
XeroBank's vpn protects anonymity, and in this specific case, ajax won't be able to compromise your ip anonymity because all traffic will exit...
n8, If you are concerned about ID theft of financial info, a VPN does not address that problem. Instead, have her go open a free account at...
Transparency is not compatible with privacy. Privacy must be secret by definition. Transparency only works with security. No, it is done by...
Actually the payload was published. Somehow, within 30 minutes of being published, it managed to disappear from google cache, and get erased from...
You're not the only one that finds it slightly discouraging. I wanted to talk tor because you've got good questions. Yes, somewhat. If the...
My previous questions weren't rhetorical. I really am interested in your replies. Transparency lends the illusion of integrity, because things...
I don't think you are a client, so I'm unsure of what ground you have to comment unless you are also part of the disinformation compaign. For...
It's my pleasure; sadly I often don't have time to visit this forum as often as i would like, but intelligent debate is pretty rewarding. It...
It isn't really that far fetched. We go to extreme measures to protect our clients, and we don't mention what some of those extreme measures are...
It would require seeing the rest of the routing rules in your windows network config, because subsequent rules could reroute those addresses or...
My first thought is that this is a ploy by google to 1) capture and associate cellphone #s to gmail addresses 2) reduce spam 3) reduce automated...
katio, realize that you are talking about xb vs tor. I am only talking about xyz vs tor. it appears you have a specific agenda since your comments...
You could say that as a design decision, but effectively that isn't the case in reality. Remember: leveraged unpredictability. My concern when...
There are various ways of securing openvpn. The problem is not openvpn itself, but the way windows does networking altogether. In a linux system,...
The browser bundle is moderately protected against known side-channel attacks and weak against 0-day side-channel attacks, which covers most of...
To my understanding, the lower the metric, the sooner that network rule/route/adapter is considered. Metric 1 rules/route/adapter take precedence...
Separate names with a comma.