Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 14 Mar 2009 08:21:01 +0100 (CET)
From:      Wojciech Puchar <wojtek@wojtek.tensor.gdynia.pl>
To:        Modulok <modulok@gmail.com>
Cc:        Gilles <gilles.ganault@free.fr>, freebsd-questions@freebsd.org
Subject:   Re: Anonymizer tool like Tor?
Message-ID:  <alpine.BSF.2.00.0903140819580.36513@wojtek.tensor.gdynia.pl>
In-Reply-To: <64c038660903132056o5259bb7ev76d4f66937896360@mail.gmail.com>
References:  <i9khr4du3kqfhc2p2fpbtl0jqvqdapumns@4ax.com> <64c038660903132056o5259bb7ev76d4f66937896360@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
> through a GELI encrypted GEOM. (No plain-text ever touches the disk.)

much better - use keyboard password.

> Edit the rc.conf file to spoof the Ethernet (MAC) hardware address to
> be a new pseudo-random value at each boot. Configure the system to
> automatically receive an IP address via DHCP. Dissable the wireless
> card. (Most have a physical switch.) Boot the system with the USB
> stick at home. Leave the USB stick at home! Plug the laptop it into a
> cigarette lighter adapter in your car. Go perusing through urban areas
> during daylight hours looking for un-secured wireless networks. (There
> are many to be found.) Once you find a connection, do your business.

this works well in Poland.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.00.0903140819580.36513>