"We can't say how our client application works"
Oh FFS. It'll be pulled apart in about 30 minutes by some bored 14 year old kid then.
Or they could just use be using Tor hidden servers, and this is a branded Tor client ?
1475 publicly visible posts • joined 12 Jun 2009
"(a quick shufty at your mobile device would show that you coughed up the necessary, should they actually give a shit about that)."
You were obviously not of the generation that faked 'cleared memory' screens on to their graphical calculators before taking them into an exam, chock full of handy hints and tips...
But how will this magic software know it's not already running atop a compromised machine, and is in fact on the bare metal as the first 'visor in the stack ? And why wont the same 'force self to the bottom' technique work for malware ?
QubesOS has a much better approach...
So we're blocking using the child porn filter for business reasons, but upgrading it to whole domains ? So foo.newsbin2.cc is banned, but foo2.newsbin2.cc wont be ?
And the rich can keep paying 20 quid a time and infringe what they like, while the poor innocents are guilty until they prove innocence, assuming they have the cash ?
This does not sound good.