Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
donkulator52713h@yenaidong It seems like a fair suggestion to me. If you want to route your OF traffic through someone else's connection, you might as well choose someone who knows you and who is partly responsible for you having ended up that way. -
@donkulator everything protected on one side, without protection on the other side.
-
One thing you can do is order some Pi-zeros and 3d print a case that includes a small power brick and the pi. Setup NetworkManager on the pi so it **always** tries to connect to any and all open access points. You might have to write some scripts to try to auto-click through the "I agree" and rotate APs if there isn't one.
Setup the Pis so they get their command-and-control to some place that can't be easily traced back to you. A private IRC chatroom is a good idea. Set them up so they join and you message them a key to get a shell.
Probably best to setup TOR hidden servers on them to make SSHing easier and not easily traceable.
You _could_ setup Iodine (TCP-over-DNS) which will get you past most captive portals (most of those "sign-in" wi-fi networks still allow DNS), but you need to setup an Iodine server and now someone could trace the devices back to you if they're found.
Hide them behind furniture, laundry machines .. wherever. You can build up a small proxy nework.
Related Rants

Seems legit.
(No clue what the source is.)
Residential proxies are quite expensive, but I'm not skilled at setting up a proxies server. I've used Thordata's residential proxy service before. As far as I know, top-tier proxies include Brightdata and OxyLabs, but both are too pricey. My budget is around Thordata's. Do you have any other recommendations?
question
proxy
proxies