PDA

View Full Version : Hide My A$$ vpn + privacy service



Glass
27th June 2013, 08:46 PM
I was recently introduced to this service. Hide My Ass. This is not an anonymous search engine. It is a private VPN service.

There is a free URL anonymizer or a payfor service. The pay for service can be deployed on your WinPC, MacPC or LinPC. It can be deployed on your smartphone or tablet. You can use their software or if you know how, set it up yourself on your devices. You can run it all the time or when you want.

You can also setup your internet router so that everything using your network goes via this service without individually configuring each one. You can select what region of the world you come out on, so you could choose local, same country or any other country.

I am going to run this for a couple of months and see how it goes. I have an interesting test for this service over the next few weeks where "someone" needs to be in some other part of the world or not the usual place is probably a better way of describing it.

Im not going to vouch for the safety of it. DYODD. If anyone has a good or bad experience they can share please do.

PatColo
28th June 2013, 01:26 AM
I haven't listened yet, just figure I'll drop it in this thread, see 2nd hour guest:

Friday, June 28, 2013

Jeff Rense Radio Show - 2013.06.27 (http://grizzom.blogspot.com/2013/06/jeff-rense-radio-show-20130627.html)



http://www.rense.com/1.mpicons/thinlogo2color.gif (http://www.rense.com/)

Listen (http://www.talkshoe.com/resources/talkshoe/images/swf/lastEpisodePlayer.swf?fileUrl=http://k002.kiwi6.com/hotlink/f2w0nt05tb/rense.20130627.1of3.mp3) Download (http://k002.kiwi6.com/hotlink/f2w0nt05tb/rense.20130627.1of3.mp3) Hour 1 - Devvy Kidd (http://www.devvy.com/) - America At The Brink

Listen (http://www.talkshoe.com/resources/talkshoe/images/swf/lastEpisodePlayer.swf?fileUrl=http://k002.kiwi6.com/hotlink/0v0dky97b3/rense.20130627.2of3.mp3) Download (http://k002.kiwi6.com/hotlink/0v0dky97b3/rense.20130627.2of3.mp3) Hour 2 - Michael Wood (http://michaelwoodcrypto.com/) - Master Cryptographer

Listen (http://www.talkshoe.com/resources/talkshoe/images/swf/lastEpisodePlayer.swf?fileUrl=http://k002.kiwi6.com/hotlink/171b0zuszq/rense.20130627.3of3.mp3) Download (http://k002.kiwi6.com/hotlink/171b0zuszq/rense.20130627.3of3.mp3) Hour 3 - Jim Marrs (http://www.jimmarrs.com/) - The View From Marrs


Cryptography (or cryptology; from Greek (https://en.wikipedia.org/wiki/Ancient_Greek) κρυπτός (https://en.wiktionary.org/wiki/en:%CE%BA%CF%81%CF%85%CF%80%CF%84%CF%8C%CF%82), "hidden, secret"; and γράφειν (https://en.wiktionary.org/wiki/en:%CE%B3%CF%81%CE%AC%CF%86%CF%89#Ancient_Greek), graphein, "writing", or -λογία (https://en.wiktionary.org/wiki/en:-%CE%BB%CE%BF%CE%B3%CE%AF%CE%B1#Greek), -logia (https://en.wikipedia.org/wiki/-logy), "study", respectively)[1] (https://en.wikipedia.org/wiki/Cryptography#cite_note-1) is the practice and study of techniques for secure communication in the presence of third parties (called adversaries (https://en.wikipedia.org/wiki/Adversary_%28cryptography%29)).[2] (https://en.wikipedia.org/wiki/Cryptography#cite_note-rivest90-2) More generally, it is about constructing and analyzing protocols (https://en.wikipedia.org/wiki/Communications_protocol) that overcome the influence of adversaries[3] (https://en.wikipedia.org/wiki/Cryptography#cite_note-modern-crypto-3) and which are related to various aspects in information security (https://en.wikipedia.org/wiki/Information_security) such as data confidentiality (https://en.wikipedia.org/wiki/Confidentiality), data integrity (https://en.wikipedia.org/wiki/Data_integrity), authentication (https://en.wikipedia.org/wiki/Authentication), and non-repudiation (https://en.wikipedia.org/wiki/Non-repudiation).[4] (https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4) Modern cryptography intersects the disciplines of mathematics (https://en.wikipedia.org/wiki/Mathematics), computer science (https://en.wikipedia.org/wiki/Computer_science), and electrical engineering (https://en.wikipedia.org/wiki/Electrical_engineering). Applications of cryptography include ATM cards (https://en.wikipedia.org/wiki/Automated_teller_machine), computer passwords (https://en.wikipedia.org/wiki/Password), and electronic commerce (https://en.wikipedia.org/wiki/Electronic_commerce).

[...] more: https://en.wikipedia.org/wiki/Cryptography

Agrippa
28th June 2013, 03:45 AM
Hide My Ass has a history of keeping logs, and turning them over to government agents upon request. A VPN provider who keeps no logs might be a better choice.

Glass
28th June 2013, 06:07 AM
thanks. any references?

JohnQPublic
28th June 2013, 07:09 AM
This is interesting. I am starting to look seriously at anonymity. Now that we have verification of what we all suspected, plus a greater awareness how even Google, Yahoo, etc. use our information, I want to take some control back. I have been using DuckDuckGo and Ixquick (Startpage) as browsers. Often I switch to one of them before going to another site, because each site likes to (and can) see where you came from. I used to use Google as an intermediate, but that only empowers Google, who has already sold out.

Rubicon
28th June 2013, 08:42 AM
VPN Services That Take Your Anonymity Seriously, 2013 Edition (https://torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition-130302/)

Which VPN Service Providers Really Take Anonymity Seriously? (http://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007/)

Glass
28th June 2013, 05:22 PM
So they are blatantly not very private are they? Thanks for that. My needs are a bit different to what it's main purpose is, now I know what that is after reading the fiasco link (http://blog.hidemyass.com/2011/09/23/lulzsec-fiasco/). I'm sure it meets its main purpose well. It might still meet the purpose I was considering but I need to think about it some more. I'm not the one using it.