I accepted the notion that there is no privacy on the Internet. The=20 harder you try to hide the more interesting you are to others. OTH, an understanding of how the system works is useful for the purposes=20 (and others) that you have listed here. Technology has assured that there is little privacy in all modes of=20 life. Our local governments have banned computers, tablets and cell=20 phones from most offices. Amazon.com sells keychain cameras for less=20 than $5! Dash cams in vehicles seem to a great idea to me. When I go=20 shopping, I take my ten inch Android tablet to take pictures of products=20 & their labels to consider later. Privacy is now a myth. On 10/18/2013 8:11 PM, RussellMc wrote: > 1. Anonymisation methods are arguably acceptable here, but PLEASE do not > let this drift into an anti-authority rant or good stuff may be pre-empte= d. > > 2. Lightweight methods include using "Incognito" modes or similar in > browsers. Your IP address at least will still be discernible. > > 3. Use of proxy server services are at best no better than an NSA court > order unless the interface is in an inaccessible location (legally and/or > geographically) and maybe not then. As most users are not *too* concerned > about NSA level attacks proxy servers usually serve well enough. > > I occasionally use a proxy server to access sites which have country > specific action or content delivery or barring for reasons which seem to > make no legitimate sense to me. As an example, a file serving service was > limiting access to a file which was public domain and which I had a > legitimate right wrt IP content to for other reasons even if it had not > been PD. > > The service I used to use was free for occasional use but they have now > stopped free access. Recommendations re free and legitimate proxy server > portals welcomed. > > I'd be inclined to have reservations about the security of services offer= ed > by anyone offering top obscure my identity :-). Some do this with the > purest of motives, no doubt, but this can never be certain. Using such > services exposes you to the unknown capabilities of their system. The ver= y > capable may be able to ensure that end to end security of such arrangemen= ts > but most will be at the mercy of persons unknown whose privacy statements > are liable to be even less trustable than usual, should they exist. > > I have used a proxy server to access my own system from the 'web' side to > see how it appears to those accessing it. For example, accessing an Apac= he > server from inside one's own router/firewall produces different results > than if accessed from the web. There are other ways to address this but a > proxy server worked well for me. > > Chrome's 'incognito' system allows simultaneous logon as different users = to > services which identify you via 'cookies'. eg multiple GMail sessions. > > > > > Russell --=20 John Ferrell W8CCW "Shut her down Scotty, she's sucking mud again!" --=20 http://www.piclist.com/techref/piclist PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist .