Date: Sat, 14 Mar 2009 08:21:01 +0100 (CET) From: Wojciech Puchar <wojtek@wojtek.tensor.gdynia.pl> To: Modulok <modulok@gmail.com> Cc: Gilles <gilles.ganault@free.fr>, freebsd-questions@freebsd.org Subject: Re: Anonymizer tool like Tor? Message-ID: <alpine.BSF.2.00.0903140819580.36513@wojtek.tensor.gdynia.pl> In-Reply-To: <64c038660903132056o5259bb7ev76d4f66937896360@mail.gmail.com> References: <i9khr4du3kqfhc2p2fpbtl0jqvqdapumns@4ax.com> <64c038660903132056o5259bb7ev76d4f66937896360@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> through a GELI encrypted GEOM. (No plain-text ever touches the disk.) much better - use keyboard password. > Edit the rc.conf file to spoof the Ethernet (MAC) hardware address to > be a new pseudo-random value at each boot. Configure the system to > automatically receive an IP address via DHCP. Dissable the wireless > card. (Most have a physical switch.) Boot the system with the USB > stick at home. Leave the USB stick at home! Plug the laptop it into a > cigarette lighter adapter in your car. Go perusing through urban areas > during daylight hours looking for un-secured wireless networks. (There > are many to be found.) Once you find a connection, do your business. this works well in Poland.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.00.0903140819580.36513>