What protocols and data can I encrypt and anonymize with Perfect Privacy?
You can encrypt all protocols and data you can send through OpenVPN, PPTP VPN or an SSH tunnel and anonymize all protocols and data you can either send through an HTTP squid proxy, a SOCKS 5 or through a VPN. In a nutshell, that’s, with minor exceptions, everything the TCP/IP protocol can carry: HTTP, FTP, Gopher, SSL, SSH, Bit torrent, ED2K; as well as browsers, FTP clients, P2P clients, IRC, Instant Messengers, and servers of all sorts. You can also choose to encrypt and anonymize some data, only anonymize others, and leave again other data completely decrypted and unanonymized. Perfect Privacy offers you ultimate flexibility and control over which content you want to encrypt and anonymize. It is even possible to encrypt and anonymize data produced by software that has no native proxy support. Please consult the help files in our members’ area.