<p>Do you guys use proxies? And if so, what do you use and why do you use them.</p>
<p>I used to use proxies in order to gain anonymity while I surf the internet and circumvent firewall, but I now use virtual private network.</p>
<p>bump 10 characters</p>
<p>I only use proxies at school, to get on facebook and other blocked sites.</p>
<p>^do you use any in particular? or just whatever?</p>
<p>I Don’t use web proxies due to my school blocking all of them.</p>
<p>^oh so how’d you get on fb and other blocked sites?</p>
<p>suffix Proxy, [Proxy</a> server - Wikipedia, the free encyclopedia](<a href=“Proxy server - Wikipedia”>Proxy server - Wikipedia) check out that wikipedia link, has info on every type of proxy basically.</p>
<p>If I really need absolute anonymity for whatever reason, I close my current browser and start up a different firefox profile configured for minimal incoming traffic, as well as a proxy chain set up consisting of continuously updated Web, HTTP, SSL, and SOCKS5 overseas servers, in addition to TOR button and NoScript services. I’d also start running two VPNs, one of which is based on foreign soil. I’d also close all unused ports and reconfigure my firewall to run all traffic through me before being cleared. </p>
<p>It’s overkill and I never use those full settings. I’m paranoid enough to have them anyway, just in case.</p>
<p>^haha that’s a lot to go through… what’s the paranoia about?</p>
<p>“Paranoia, for lack of a better word, is good.”</p>
<p>^^ I dunno lol. I just have those configurations preset, just in case. </p>
<p>I have a few random security based programs installed which I’ll probably never need. Like, I have on-the-fly encryption software which can completely lock down and encrypt my entire hard drive through three individual algorithms and five additional combinations of cascaded algorithms through three cryptographic hash functions. It can even hide any trace of encrypting if done properly by hiding the volume within another volume of random data.</p>
<p>I also have another program which can be remotely activated to broadcast a signal and take pictures via webcam should my laptop ever be stolen.</p>
<p>It’s like a contingency plan for my worst case scenarios, no matter how improbable.</p>
<p>^And what’s your occupation? Also, I’m curious as to what the download rate is with your aforementioned settings lol.</p>
<p>Your contingency plan must be racking up quite a monthly payment cost :P</p>
<p>@AeroEngineer3141
How did you set that up with your laptop, just use a remote software to control your picture then write a program that takes pictures automatically?</p>
<p>@r0adTo3b what VPN do you use?</p>