Why You Need It?
When you connect to the internet through your normal unsecured connection, your requests and information are relayed through several servers before reaching their final destination. These servers have the ability to collect all the information passing through them, the most common example of a server like this is your own I.S.P, who can monitor and record everything that you do because your connection is not encrypted.
Man in the middle attacks: Secured Tunnel is the absolute best way to protect from man in the middle attacks and evil twin scanners. MTM attackers have the ability to read, modify and insert communications between two locations without either location being aware that their communication has been compromised.
If you use internet wireless hot spots, evil twin attacks attempt to fool a laptop or PDA by posing as a legitimate wi-fi provider, like one at an airport or your well known cyber cafe. Once you connect to their network these evil twins watch your every online move and steal your confidential information. Secured Tunnel protects you from these dangers by effectively encrypting all your online communications with advanced and powerful AES-256 encryption through an SSH-2 connection.
This powerful AES-256 encryption technology runs silently and effortlessly in the background when you activate it before you go online. It encrypts all transmissions you put through it when you're online by creating a secure and impregnable SSH-2 connection from your computer to our servers. The I.P information any site you visit can see is our I.P. address, your details and location aren't available to them. This secure SSH-2 connection includes both your private banking and other SSL activities as well as all your standard internet surfing. It ensures that your privacy is always protected and that what you do online is only your business. Your secure and private e-mail and news messages are all sent and received in complete privacy and anonymity, your real I.P. and I.S.P information is not seen by anyone and your e-mail messages appear as localhost 127.0.0.1. We offer you an anonymous pop/smtp mail account with your subscription. We include easy to understand color picture and text set-up instructions with each account, including instructions for Apple Macintosh users as our tunnels are completely compatible with Mac and Linux!
Enjoy secure and anonymous messaging and chat, IRC, ICQ, AIM and more! Our Secured Tunnels are P2P capable for your Privacy Offshore enhanced service account (standard).
Enjoy added protection against hackers, DNS spoofing, DNS attacks, web based virus's and many other threats!
To Further Enhance Your Anonymity and Privacy We Include for Your Optional use:
* Through squid > proxy on port 4912
* Through privoxy > squid on port 8118
* Through privoxy > Tor on port 8119
Using Tor directly requires socks 4/5 enabled tools > through port 1003
All Our Servers are Tor enabled and are FULL Tor Entry Points!
This adds more security to your online anonymity and privacy for free. Tor usage is also optional.
We Currently Offer servers In:
Holland, Germany, Hong Kong, Luxembourg, Czech Republic, Russia (VPN option available) and Malaysia. More locations are on the way!
All our tunnel servers DO NOT REVEAL that you are using a proxy! They are completely anonymous!!
Tor is blocked by many websites, as it's recognized as a proxy, some of our competitors also "leak" the use of a proxy. The tendency with many websites like financial and banking ones is to block you if a proxy is detected. You're undetectable with the use of Privacy-Tunnels from Privacy Offshore!
* Remember, Offshore is where you're not!