Not4gotten wrote:Ok, yes, I am new. I have been googleing (googling?) for a while to find out if I'm setting up properly for anonymity, but I can't seem to find anything from what I'm considering "reliable" people to answer the question... So...
Basically, I would like to know how well I'm hidden, so to speak. My "private" browsing goes through FF with cookie self-destruct, AdBlock Plus, running Symantec Endpoint Protection firewall/antivirus, etc. My data goes through a no-log VPN (off-site) with DNS leak protection and a VPN kill if I fall off. I don't use FF for any login sites (except this one), and destroy history and flash cookies on browser exit...
1. How secure and anonymous is my setup?
2. Is there any way to make it a little more secure?
Thanks for the help, all! I'm kinda in the learning process, so I figured the best thing to do is to button up my end before I unbutton someone else's end (legally, of course).
As for the tor situation.. You WILL see a downgrade in performance. And it can sometimes be a pretty big downgrade. So I'd suggest using it really only when it's needed, unless you're so paranoid that you'd give speed for security all of the time.
Not4gotten wrote:Yeah, no. I see my VPN is either becoming popular, or some of the security stuff is weighing things down already without TOR. I think since I'm not doing any actual testing, I'll forgo TOR for now.
Additionally, I am thinking of doing a VMWare machine for at least Ubuntu or some other *nix distro so I can do some lernin'. Will the VM run through my current tunnel, or will it act separately and require it's own VPN connection? I'm asking for the sake of asking right now, and realize I can do an IP/DNS leak test once I boot, but knowing thine enemy before seeing his face is always a better course of action.
And no. I'm not going to ask what version of *nix is better... That's like asking between Ford & Chevy at the infield of Daytona on this site... Enough blood has been shed.
Users browsing this forum: No registered users and 0 guests