It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

McAfee reveals details on anti-surveillance device. Will sell worldwide if blocked in the US.

page: 3
37
<< 1  2   >>

log in

join
share:

posted on Oct, 2 2013 @ 03:49 PM
link   

sean
I am skeptical of this. Everyone that connects to the net goes through some provider. That point of entry to the internet cloud is monitored and controlled. They know who connects and where they connect from, as well collect hardware data that can be tracked. The only way to get around this is to create a new internet provider with a large backbone that hasn't been tapped by the Gov. Good luck with that as there is laws in place that you would be harboring criminal activity if a user was doing nefarious things under a network that is in your control. They would be correct in saying that. There really is no way unless you control the connection from beginning to end. However, there is encryption protecting the data stream from beginning to end. VPN does mask your IP, but that is limited to the server that provides the VPN access. Snowden was using this sort of way to communicate using a middleman connection VPN or encrypted e-mail. What happen to the people who offered that connection? They was forced to shut down. Becoming truly anonymous means breaking laws in some way or another.


No not true first lets say we have 5 internet connections 5 different users. Now i can set up a VPN between the 5 of you you could be in completely different states. Now one of the parameters i can set up is shared bandwidth so you get on your computer and you send an email to someone monitoring the 5 ip address they would see parts of the information sent on 5 ip addresses to be assembled at the destination. The internet doesnt have to have packets all from the same source it has a built in redundancy.In fact things on the internet rarely takes the same route. Now picture instead of 5 we have a hundred or a thousand. Someone on the other side trying to tell where the email originates from has a thousand different locations all with part of the same email. This effectively makes it impossible to trace back to the source. This is how the Chinese get around their governments censorship. If you want to become invisible on the world wide web heres a program to get you started its called freenet. It uses something called Secure shell tunneling this is really how unix works .

freenetproject.org...



new topics
 
37
<< 1  2   >>

log in

join