Using Tor had to be the most uncomfortable experience with protecting my privacy on the Internet. Mainly because I had no control over where the connection was routed. (It doesn't exactly descibe the owner of the machine that is in Bulgaria, so for all I know, I could be giving out my private info while protecting my private info.) So as one of the many things I am doing this weekend (brace yourself for a bunch of new topics), I'm giving I2P (
http://www.i2p2.de/) a try.
This will be done over a wireless hotspot connection through my smartphone. (If I was gay, I would totally make out with the "Can you here me now" guy (who surprisingly IS gay) right now because Verizon has been so incredibly awesome to me over the past few months especially when my folks don't pay AT&T on time, and AT&T shuts off the internet right about the same time the house is being pelted with 2 inch hail and a trip to Weather.gov (
http://www.weather.gov/stlouis) is desperately in order!))
So, before Verizon notices the torrents of a couple of Linux distros I'm trying out this week to see which would be better to install on a thumbdrive as a dual boot with Windows 8 Consumer Preview, I should probably learn how to create an encrypted Internet connection and learn how to use an Internet Tunnel to protect my privacy through the Dark Internet (
http://en.wikipedia.org/wiki/Dark_Internet).
I'm opening up this threat to start a discussion on Onion Routing and Garlic Routing and which would be better and perhaps clear up the perceptions (including my own) about what these things do. (Because I could be wrong but not as wrong as the people who write how the Dark Internet is where hackers do evil. (which is a load bunk for the most part.))
Let the battle of the bulbs begin!