![]() ![]() ![]() Pro: To your local network it'll also look like standard encrypted SSH traffic.ssh -D 9090 you can set your browser's proxy (remember it has to be a SOCKS proxy, not HTTP - that won't work) to localhost:9090 and boom, your traffic is fully encrypted all the way out to the server. ![]() Personally, I'd opt to just SSH to a server of mine and use its OpenSSH's built in SOCKS proxy. If you're using SSL over Tor, that's even better. The problem with Tor is the exit node (whose traffic could be sniffed) but that's hard to predict or manipulate (unless you're the NSA). Tor should protect you from your local network, if that's what you're worried about. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |