Network Security
While traveling you’re always using someone else’s network. Who is listening?
Using phone tethering
Tethering your laptop to your phone’s cellular connection is safer than free wi-fi, and maybe faster too.
Free wi-fi
Not secure. Not. Not. Not. Don’t do anything sensitive.
With a VPN
I can’t recommend a commercial VPN service because I’ve never used one. Some of my client projects require a VPN to access the client’s network, so I’ve just used that.
With an SSH tunnel
Open a shell and SSH into a server you control:
ssh -D 8888 [email protected]
- The
-D
flag establishes the connection with dynamic port forwarding. - The
8888
sets the port for the connection.
Then setup the SOCKS proxy to catch outbound connections on port 8888
:
- Open “System Preferences” app
- Click “Advanced” button
- Click “Proxies” tab
- Check “SOCKS proxy” option
- Type server:
localhost
- Type port:
8888
- Click “Ok” button
- Click “Apply” button