Quote:
Originally Posted by feredim-924
On other boards, they told me that this is actually the best setup:
|
Security is not a hard-&-fast state. It is a finding a level of acceptable risk. Without knowing anything about what your security goals are, it is very difficult to comment on whether your proposed topology meets those needs.
Personally, relying on a third-party infrastructure
(historically with imperfections...) is putting
great faith in something in which you have no control.
Quote:
Can I use TOR to wholly encrypt my OpenBSD system?
|
No.