It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by StaceyWilson
wooo, where you get that avatar,meaning,is that book,episode REAL????
Anonymous
Disclaimer of Warranties
This service is provided as-is, and Anonymouse disclaims all warranties of any kind. Anonymouse gives no warranty that this service will be uninterrupted, secure or free of errors.
The cloak
In accordance with our abuse policy described below, we reserve the right to turn over the IP addresses of people who abuse our system either to the appropriate legal authorities, or to those against whom abuse has been perpetrated. Use of this service constitutes acceptance of the terms of our abuse policy.
Originally posted by zaiger
Those "anonymous" sites do keep server logs and you are no more safe using them then you are your regular IP address.
Originally posted by ganjoa
If the data spooks are looking for you I have no suggestions unless you can go swiftly and completely "dark" off-grid leaving no trace of activity on any network.
Originally posted by zaiger
What exactly are you trying to do?
The best you could get is a dynamic IP but even that is not "anonymous" nothing really is except for using a cyber cafe or public library. But even those places are watching.
All that an anonymous proxy does is make it so that law enforcement has to get one more subpoena to get your IP address.
What about wifi?
Unless it the proxy is outside of the country yes?
Only problem is some of those alphabet soup agencies haven't been known to follow the law that closely!
Originally posted by zaiger
Yes and no, here in the US we are protected by the laws law enforcement has to follow.
Originally posted by GhostR1der
reply to post by In nothing we trust
One without a microsoft logo or a piece of fruit.... preferrably a penguin. Slackware linux - go have a look at it but if you're not too computer oriented then it might be a tad tricky.
Linux has many 'entry points' but also much more ways to monitor those entrances.
Windows has lots of 'entry points' and not many ways to monitor them. And NSA crypto backdoors...
[edit on 1/3/10 by GhostR1der]
Originally posted by m0r1arty
There are levels of caution you take the closer you get to someone who does know what they are doing.
Best bet I'd say is either leave it alone or go study some Blackhat techniques, and study them well.
Do you even know what "goto 20" means?