Editing Visitors

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 51: Line 51:
The network at Noisebridge - like any public network - should be regarded as potentially hostile. This means that you should assume that any unencrypted communications over the network could be (and most likely are) monitored by others. Examples of vulnerable communications include POP3/IMAP email clients, most web browsing, IRC/AIM and similar chat protocols that are often not encrypted. While no issues have come up to date, and our code of conduct opposes malicious monitoring of others, it is wise to be aware of the potential. Stick to using SSL or secure tunnels or VPNs for anything that uses a password or that you otherwise wouldn't want other people to read. If you don't know how to protect your communications with encryption, many people at Noisebridge would be glad to help you out!
The network at Noisebridge - like any public network - should be regarded as potentially hostile. This means that you should assume that any unencrypted communications over the network could be (and most likely are) monitored by others. Examples of vulnerable communications include POP3/IMAP email clients, most web browsing, IRC/AIM and similar chat protocols that are often not encrypted. While no issues have come up to date, and our code of conduct opposes malicious monitoring of others, it is wise to be aware of the potential. Stick to using SSL or secure tunnels or VPNs for anything that uses a password or that you otherwise wouldn't want other people to read. If you don't know how to protect your communications with encryption, many people at Noisebridge would be glad to help you out!


=====Attempt at a Semi Decent Guide=====
---Attempt at a Semi Decent Guide---


The most secure option you have is to set up [https://inside.mines.edu/~gmurray/HowTo/sshNotes.html an SSH tunnel] to a remote server, and then use a proxy server like [http://www.pps.jussieu.fr/~jch/software/polipo/ Polipo] to forward all your HTTP through that server.  Done properly, this will encrypt all your traffic without any further worries.  If you do not have SSH access to a remote server, then you can use Tor or similar to encrypt your traffic without exposing it to the Noisebridge network.
The most secure option you have is to set up [https://inside.mines.edu/~gmurray/HowTo/sshNotes.html an SSH tunnel] to a remote server, and then use a proxy server like [http://www.pps.jussieu.fr/~jch/software/polipo/ Polipo] to forward all your HTTP through that server.  Done properly, this will encrypt all your traffic without any further worries.  If you do not have SSH access to a remote server, then you can use Tor or similar to encrypt your traffic without exposing it to the Noisebridge network.
Please note that all contributions to Noisebridge are considered to be released under the Creative Commons Attribution-NonCommercial-ShareAlike (see Noisebridge:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)