It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by SLAYER69
Well it might not seem like much to some but I've already been getting a This video is not available in your country garbage on Youtube etc etc etc. The internet is for the free exchange of ideas and information.
A virtual private network (VPN) is a secure way of connecting to a private Local Area Network at a remote location, using the Internet or any unsecure public network to transport the network data packets privately, using encryption. The VPN uses authentication to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the private network packets. The VPN can be used to send any kind of network traffic securely, including voice, video or data.
VPNs are frequently used by remote workers or companies with remote offices to share private data and network resources. VPNs may also allow users to bypass regional internet restrictions such as firewalls, and web filtering, by "tunneling" the network connection to a different region.
Originally posted by boondock-saint
free internet users are like a wild animal.
Once it gets use to the free taste of blood,
it can never go back to regular dry dog food.
Originally posted by Paul47
The internet is Pandora box to those who want to sensor information. Our kids will not let that happen. They are the ones who are growing up with it. I as a parent I try to answer all my kids questions as best I can and if I can’t, or am unsure we look it up. They are amazing on their quest for information if they want it. So far censorship of the internet has been week at best, as computers improve and the users become better at using them, Hackers will keep the information flowing and for you guys that do that. Thanks.
Originally posted by juleol
Humans get used to anything when it is done in small steps over a longer period of time.
Most people will sadly not react before it is way too late...
Trusted delivery networks
Trusted VPNs do not use cryptographic tunneling, and instead rely on the security of a single provider's network to protect the traffic.
Multi-Protocol Label Switching (MPLS) is often used to overlay VPNs, often with quality-of-service control over a trusted delivery network.
Layer 2 Tunneling Protocol (L2TP) which is a standards-based replacement, and a compromise taking the good features from each, for two proprietary VPN protocols: Cisco's Layer 2 Forwarding (L2F) (obsolete as of 2009