From owner-freebsd-questions@FreeBSD.ORG Sat Mar 14 07:21:16 2009 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 0C553106564A for ; Sat, 14 Mar 2009 07:21:16 +0000 (UTC) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from wojtek.tensor.gdynia.pl (wojtek.tensor.gdynia.pl [IPv6:2001:4070:101:2::1]) by mx1.freebsd.org (Postfix) with ESMTP id 4DEE08FC0C for ; Sat, 14 Mar 2009 07:21:15 +0000 (UTC) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from wojtek.tensor.gdynia.pl (localhost [IPv6:::1]) by wojtek.tensor.gdynia.pl (8.14.3/8.14.3) with ESMTP id n2E7L3qo036517; Sat, 14 Mar 2009 08:21:03 +0100 (CET) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from localhost (wojtek@localhost) by wojtek.tensor.gdynia.pl (8.14.3/8.14.3/Submit) with ESMTP id n2E7L2bE036514; Sat, 14 Mar 2009 08:21:02 +0100 (CET) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Date: Sat, 14 Mar 2009 08:21:01 +0100 (CET) From: Wojciech Puchar To: Modulok In-Reply-To: <64c038660903132056o5259bb7ev76d4f66937896360@mail.gmail.com> Message-ID: References: <64c038660903132056o5259bb7ev76d4f66937896360@mail.gmail.com> User-Agent: Alpine 2.00 (BSF 1167 2008-08-23) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed Cc: Gilles , freebsd-questions@freebsd.org Subject: Re: Anonymizer tool like Tor? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 14 Mar 2009 07:21:16 -0000 > through a GELI encrypted GEOM. (No plain-text ever touches the disk.) much better - use keyboard password. > Edit the rc.conf file to spoof the Ethernet (MAC) hardware address to > be a new pseudo-random value at each boot. Configure the system to > automatically receive an IP address via DHCP. Dissable the wireless > card. (Most have a physical switch.) Boot the system with the USB > stick at home. Leave the USB stick at home! Plug the laptop it into a > cigarette lighter adapter in your car. Go perusing through urban areas > during daylight hours looking for un-secured wireless networks. (There > are many to be found.) Once you find a connection, do your business. this works well in Poland.