Network Security
While traveling you’re always using someone else’s network. Who is listening?
Using phone tethering
Tethering your laptop to your phone’s cellular connection is safer than free wi-fi, and maybe faster too.
Free wi-fi
Not secure. Not. Not. Not. Don’t do anything sensitive.
With a VPN
I can’t recommend a commercial VPN service because I’ve never used one. Some of my client projects require a VPN to access the client’s network, so I’ve just used that.
With an SSH tunnel
Open a shell and SSH into a server you control:
ssh -D 8888 [email protected]
- The
-Dflag establishes the connection with dynamic port forwarding. - The
8888sets the port for the connection.
Then setup the SOCKS proxy to catch outbound connections on port 8888:
- Open “System Preferences” app
- Click “Advanced” button
- Click “Proxies” tab
- Check “SOCKS proxy” option
- Type server:
localhost - Type port:
8888 - Click “Ok” button
- Click “Apply” button