<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html style="direction: ltr;">
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
<style>body p { margin-bottom: 0cm; margin-top: 0pt; } </style>
</head>
<body style="direction: ltr;"
bidimailui-detected-decoding-type="latin-charset"
bgcolor="#ffffff" text="#000000">
<br>
-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA1<br>
<br>
<br>
On 09/08/2011 11:12 PM, Rick Moen wrote:<br>
<span style="white-space: pre;">> (There are always ways to
tunnel your traffic out over other protocols<br>
> in a cryptographically covered fashion. However, if they
really are<br>
> determined to spy on employees, circumventing that spying
can lead to a<br>
> permanent unpaid vacation.)<br>
></span><br>
true. i am usually using Tor for that, however, Tor could not
discover<br>
any nodes to connect to. there are ways to block anonymisers as
well,<br>
i guess.<br>
Thank you, Ehud<br>
-----BEGIN PGP SIGNATURE-----<br>
Version: GnuPG v1.4.11 (GNU/Linux)<br>
Comment: Using GnuPG with Mozilla - <a class="moz-txt-link-freetext" href="http://enigmail.mozdev.org/">http://enigmail.mozdev.org/</a><br>
<br>
iQIcBAEBAgAGBQJOabFyAAoJEAYu2FhJ51YkBo8P/RHH/nJkxuQPiPWWx0+G77lJ<br>
cKWgDGGeX3bi4+cUK/P2TFlpQNXKqb++hVf/eLdEQgx3c8akrurxIC1YbS6jRdrS<br>
SoHfmGoC5x+DOP9h9XUCaVjKqDXqfzNsuhbe54fAilJ+N2KsdsHiRbRun4I82u/v<br>
ZpJZkNyheTf7hG+uGBGVkbwtwAyJg3d6DxNlIlGAlJqM7pmpT1ewJfF3WmiDHbka<br>
kKFIrjTZ+jjD7G9xEX/xkSd8098+DoGNFQTNLqqYHVDndMilObEx7L/NQuWPm51S<br>
03IOVBppD53Y9XnFqbe22qTxh4TQP6aGic1txi9wJWYOGhYGjTHsOljrrhsLlZr/<br>
5y8DjPiN1k9KmP0aiTzgLxtKlomYQpot33HQkWtO11ASCsaaduFIEIfOMKk5zCVV<br>
HpASrLtacuOPAlQNh6PNaVXZhxCoEek8b0aadUMfSWvYAWyc+YPibCK0gRYnAgvU<br>
rZ/74ILtXZpPEqG7Uf0gWWLqXLojJ4E6j4XgrY9aK+uzmzNQcCkITgigrsgQ/Kcc<br>
Rr3elfFxjFdUL2Gg46i7Ewri7nxNfiQsKmsE91lkpZ4RzifgiTVMT7l63/+L785t<br>
0cSGM+ukjGUDUCjY7P/hML9nOg+G98/QaFeLSpUcm0OzikHA7UiWjPp/w418hICe<br>
/pj7l2kZWWwKJLaP/MHH<br>
=Sa4b<br>
-----END PGP SIGNATURE-----<br>
<br>
</body>
</html>