Internet Protocol — Virtual Personal Network
Between Wifi spoofing, Honeypot attacks, and Firesheep, open public networks actually are cesspools. This traffic is usually encrypted and authenticated and, because this performs at the IP layer, is the best general purpose VPN available, rendering end to end secureness whatsoever levels of connectivity. This requires an IP address which can be an Internet address…