T
T
TimofeiMorozov2014-04-13 19:32:14
VPN
TimofeiMorozov, 2014-04-13 19:32:14

How to hide all data (ip, location, information) from the provider for a group of users?

There is a group of users, it is required to hide all the information sent from their PC and it is desirable (but secondarily) to encrypt the information they receive. It is necessary to hide all information transmitted over the Internet - from Skype, ICQ, browsers, that's not the point.
Do I understand correctly that I need to use a VPN in conjunction with Tor? If so, how technically to implement? What is the likelihood of disclosure?

Answer the question

In order to leave comments, you need to log in

6 answer(s)
K
Konkase, 2014-04-13
@Konkase

If the information is not encrypted, then it is transmitted in the clear, hence it follows that it will not work to hide without encrypting the information. Then hide is the same as encrypt. Therefore, instead of two tasks, you are left with one.
I advise you to buy a dedicated server and raise openVPN. Tor is not recommended. The probability of disclosure of information directly depends on the capabilities of those people who are interested in disclosing your encrypted information, there is no single answer to this question.

S
Sergey, 2014-04-14
@edinorog

The probability of disclosure is high. And Thor is definitely not a helper here. At the moment, there is no completely safe option. You can implement such a bundle - the vpn server through which users receive their information, sends it to another server somewhere in Australia (for example). Infa should natitsya. Logging of using the Internet is disabled everywhere. As part of all this, we wrap everything in p2p. We turn off cookies finally. We turn off services that can issue a user on the axis (like a smartscreen). Encryption at the first stage to take a higher class. Key exchange is implemented offline. In the server room (where the rented server is located) require a webcam to monitor the rack. This is for starters =). Can still be smarter

P
PbIPXA, 2014-09-01
@PbIPXA

Can you please specify the problem statement, what is the threat model?
Who are you protecting yourself from? options:
from the administrator of your network?
from listening on the part of the provider?
from a possible interest on the part of law enforcement agencies (RF?)
From a possible interest from the law enforcement agencies of Lapland?
Do you only need to encrypt the traffic? should anonymity be ensured?
Is it necessary to hide the very fact of exchanging information with servers on the Internet?
If, for example, we talk about http surfing, is the list of sites that are accessed secret information?
Is there a purpose to hide the geographic location of users?
Paint yourself a complete picture.

H
heartdevil, 2015-09-13
@atachrus

Привет.
Вот так попробуйте

SELECT out.pole1 AS pole1, out.pole2 AS pole2 FROM 
(SELECT * FROM table ORDER BY id DESC) AS out
WHERE condition
GROUP BY out.pole1, out.pole2

X
xmoonlight, 2015-09-13
@xmoonlight

LEFT JOIN

P
prishelec, 2015-09-14
@prishelec

Если вы хотите и сортировку то, тогда запрос с GROUP BY вынесете в отдельный
SELECT * FROM (ваш запрос) AS tbl ORDE BY tbl.id (это к примеру)

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question