Yep, quite true. Indeed, there are a fair number of potential solutions, depending on the nature of what you're trying to do, of which TOR is one of the better and more general ones.
But the main point is that, in the public-access-point scenario, you probably want to do *something*, or at least be aware of the fact that the danger is greatly elevated over what it normally is when using your home computer. The odds of getting hacked probably rise from something like one in a million to something like one in a thousand. (Maybe even one in a hundred, but I suspect that's excessively paranoid at the moment...)
(no subject)
Date: 2007-08-17 05:07 pm (UTC)But the main point is that, in the public-access-point scenario, you probably want to do *something*, or at least be aware of the fact that the danger is greatly elevated over what it normally is when using your home computer. The odds of getting hacked probably rise from something like one in a million to something like one in a thousand. (Maybe even one in a hundred, but I suspect that's excessively paranoid at the moment...)