Discussion in 'Application Software' started by pisthai, Jan 4, 2017.
You need to login to view this posts content.
Thanks for this, if genuine it could come useful. But isn't there any catch, like ads (adware), slow speed, monitoring your activity etc?
Free VPNs usually have disadvantages inducing you to get the paid for version to get round them.
clicked the link, could not log in without giving my email. dankend abgelehnt!
That's something you've to test on your own, as anybody else! I'm using CyberGhost and happy with that. Just came across about this itshidden-VPN, and posted that infos.
That's simply your choice, any doubt with that! Just to mention, for such connection, I've some bogus (just real) e-mail addresses and would use that one for to test some like this out!
Sometimes, in fact most of the time, fast judging isn't the best choice!!
@nodnar: Thanks Anyway? Just curious.
@pisthai: Thank you for posting it. I know that it was done from a good place in your heart.
@pisthai thanks for the heads up dude, I can see after this app
I certainly don’t want to follow the usual pattern of looking a gift horse in the mouth and turning against the bona fide poster. This is because I’ve often enough come under attack myself for trying to inform.
The problem is that the web has made us old users rather cynic due to bad experiences. To paraphrase nodnar’s wise sig quote:
“Just because you're paranoid doesn't mean they aren't after you”
“Just because you’re cynic doesn’t mean they aren’t after using you”
So, talking in general and not necessarily referring to the present case, if I were the FBI trying to trace law-breakers, I’d offer a free VPN service, even with good performance, and then monitor carefully who’s using it and for what activity.
Which means that, if you have nothing to hide, you can take advantage of the offer, and pull your tongue out to the FBI to boot.
that's why there are trash mails, minute mails, etc...
Yes, but just bear in mind that these do not always work. Some crafty sites have them listed, recognize and reject them. In fact, several such mails even enable immediate recognition by having tell-tale names with words such as: temp, trash, spoof etc.