Even with services like ipredator, the tunneled traffic is encrypted between your system and theirs.. so your own provider can't easily (..if at all) determine what you're downloading, but theirs can.
They make the connections on your behalf, unencrypted on their end.. and someone can still eavesdrop-on/tamper-with the contents en route to the destination.
Encrypt "content", not the communication channel.
|