138
edits
m (→Windows) |
m (→Why?) |
||
| Line 5: | Line 5: | ||
Downloading email and browsing the Internet in such a way that the immediate (local) network does not know what you are doing. All it sees is encrypted SSH traffic, like that used when you type on [RedBrick] normally. | Downloading email and browsing the Internet in such a way that the immediate (local) network does not know what you are doing. All it sees is encrypted SSH traffic, like that used when you type on [RedBrick] normally. | ||
Thus you can (a little more) securely access your | Thus you can (a little more) securely access your stuff from wireless hotspots | ||
or from other insecure or filtered networks. | or from other insecure or filtered networks. | ||
edits