Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I pay to route my traffic through a barely known intermediary to obscure its origin. It all depends on your threat model for that traffic. If the traffic itself is not sensitive (or already encrypted) but you want to obscure the origin from the destination, or the destination from your ISP, it works.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: