Details zu Datenschutz, Widerspruchseinreichung etc.
der German Privacy Foundation
"In this document, we'll access another machine's network internal DNS services (UDP port 53) with only SSH access to it. We will forward local UDP/53 traffic to TCP, then TCP traffic with the port-forwarding mechanism of SSH to the other machine, then TCP to UDP/53 on the other end."
"The application that has the most remote exploits that most activist use every day is Firefox -- how sensible is to to run it with read permissions for all your data?"
googlesharing-howto and -proxy by riseup