Yes, in fact use of a VPN will get their attention faster. They can still subpoena your data from anyone, or perhaps they've already compromised your VPN provider.
Jackson Hall
So your ISP only sees =
The VPN only sees -
tor only sees *
* can't see ~~ but instead sees -. - can't see ~~ but instead sees =.
= sees your IP, but can't tell what is going on.
Carter Scott
bump
Easton Hernandez
Use paid VPN services from eastern europe, problem solved.
Leo Foster
Yes. You need to do like Trump says and don't send things electronically. You get a courier to deliver them
Carter Bennett
Why do you care?
Oh right, you want to look at cp.
Colton Long
>these words I don't understand
Sigh. I've become my parents. Time to get a job and pay for my shit...
Not to mention tor itself uses a 3 hop system (proxy chaining) as well as 3 layers of encryption.
So with my model you are looking at 5 layers of encryption.
I suggest that the VPN you use for your router be extremely fast and use only a thin layer of encryption. The point is not to have unbreakable encryption, it is to have so many barriers that attempting to break it seems pointless.
Brayden Morales
You use a VPN to make your traffic look like it's coming from Germany, you trade your home government spying on you for the German government spying on you. Just use a VPN from a country that doesn't have close ties to yours.
No need to hide your MAC address, nobody past your router sees that.
Free VPNs are basically the worst thing you can use. They're publicly run for free, so the people doing it might have shifty motives, and unlike Tor the VPN can see both your traffic and your IP address instead of just either or.
Parker Reed
I don't look at CP, I simply don't want intelligence agencies to have a complete picture of my activties online. Your activities are your thoughts and your thoughts are you. They are building hologram personalities of every person connected to the internet. When this network is sophisticated enough, they will be able to run simulations of how various actions will percolate through social media. The Kony 2012 was a landmark experiment of this system. So quite soon, they will not try something they know will fail, they will succeed because they'll run it through their hologram person test environment.
Jack Robinson
>Free VPNs are basically the worst thing you can use.
Hence hiding who is connecting to it via tor.
>vpn can see both your traffic and the ip
Top layer vpn only sees encrypted traffic from constantly changing IP (tor)
Bottom layer vpn only sees traffic, but not where it is coming from
My method works.
Samuel Butler
I don't think it's reasonable at all to assume that the government gives a shit at all about your shitposts.
Carson Hill
Also top layer vpn sees my IP. But only the random IP addresses I connect to. The encryption remains until it reaches my computer.
Mason Martinez
You are really overestimating intelligence agencies.
They just log whatever sites your direct IP is going to and store it in a huge database.
Sure, they have the capability to see through VPNs and TOR but unless you are terror suspect numero uno, they will never use ressources on you.
Ryder Parker
>capability to see through tor and vpn
This isn't magic. They don't. They have to break specific service providers or subpoena them for access. They don't automatically just get access.
Julian Brooks
VPNs usually send encrypted traffic, most i've seen do it via openssl it's impossible* to track *- however the VPN providers could have logs to track your connections, so use logless VPN providers such as IPVanish or Private Internet Access
also you don't need to have a vpn to make sure your traffic is unreadable. https already does it for you. just have sure you don't visit http websites and use plugins like https everywhere
Jonathan Garcia
I only bother using a VPN the download shit. Pain in the ass to use it all the time because google are cunts who block me from receiving my email via thunderbird when I've got it enabled. Only really use Tor for darknet stuff because of the damn CAPTCHAs, but I'm a big supporter
Ian Kelly
Use a nested VPN and for.
How? Run VMware
Inside there you use tor and a VPN. From outside of VMware connect to another VPN service
Liam Collins
Hide your tor connection with a proxy you rented via bitcoins.
Or go rent a 2 USD/mo vps and turn it into a private proxy.
Adam Edwards
LOL. Probably only Ukraine and African countries' intelligence services don't have access to all this data already. lrn2 PRISM
Isaac Roberts
>They don't automatically just get access intelligence agencies do, but they need a court order to be able to admit it for any legal process
Thomas Smith
>Implying that you are important enough to warrant attention from the government.
Justin Sanchez
The government tracks all unregistered telepaths.
Connor Bennett
>telepaths
Easton Cruz
Disable ipv6 and use a vpn that doesn't keep logs, like pia. That's it.
Anthony Phillips
Dumbfuck, look at the companies that participate in PRISM. (which isn't even relevant)
If you use layered encryption from multiple services in an arrangement like then you are fine.
Justin Richardson
That will literally do nothing.
You could make a shitpost on a Raspberry Pi that's connected over WiFi to a smart TV that's connected to a PC that transmits internet upstream via a connection 56K modem that is behind a VPN and 3 VirtualBox instances...and I guarantee you the NSA would still be able to get your dox instantly.
pic very related
Jason Phillips
Your arrangement makes no fucking sense. Of course they would catch you if you had a network architecture like that.
Colton Perez
>Disable ipv6 why?
Parker Hernandez
It can leak. Some speculate its only purpose is to make people easier to track.
Parker Miller
thanks shady user
Sebastian Rivera
Do I look like I know hwat a jpeg is?
David Price
Or.. you know.. deal with the fact that we're basically out of unallocated IPv4 addresses
Christopher Bennett
IPv6 was made because IPv4 ran out of IP blocks to assign countries.
Unless IPv6 is a protocol (it isn't) then you can still hide it just like IPv4.
The reason you need to disable IPv6 is because some services may request you default to IPv6 over IPv4. So if you use a vpn you leak IPv6.
That's only my guess though.
Nolan Robinson
Or.. you know.. not "only" purpose
Ethan Rivera
Yes, let's not suppose a false dichotomy, k guis? Go ahead and look into it yourself. I've personally experience ipv6 leaks.
Brody Perry
So it seems like I need to use a VM and two VPNs. One VPN inside the VM and one outside.
Get a tibet VPN that only accept payment in yach milk
Michael Nguyen
indisputible
Henry Turner
Don't use VM's unless you know what you're doing.
It's easiest to just configure your router, then if you want buy a raspberry pi and configure it to use the second layer of vpn.
Then connect your laptop to the raspberry pi as a gateway. That way you don't have to set this shit up every time you want to use it.
Xavier Gray
also you should add the use of tails if this guy actually needs more protection.
Gabriel Howard
A VPN is like putting your head under the sheets, unless you really know what you're doing it's not going to really help. The UK and US have unlimited spying power now, they are far more advanced than most home users.
At the very least you want to get a VPN that's not in a country friendly to the US.
Tails just uses tor you idiot. I already implemented tor in my model.
Just use nice addons and shit to protect yourself.
Spoof your user agent, https everywhere, disable tracking shit, and have self-destructing tabs and you're all set.
Also you need to have the addon to make your browser reset itself as though it's newly installed on every startup.
Also install the browser in sandboxie if you use windows.
Adrian Barnes
This, it's kind of why Malaysian proxies or Indian proxies are the best.
You would have to do something really fucked up for them to turn you over.
Ryder Gonzalez
If you are stealing wifi you need to spoof your mac. Make sure to use a usb 2.0 wifi antenna because usb 3.0 transfers hardware ID automatically
Brody Sanchez
>PIA Hello FBI!
Carter Morgan
Well, you correctly certainly ascertained that I'm a noob at this. I've been on chans for a decade and I've over the years I've felt the slow ominous specter of my lack of technological prowess creeping up on me. I just want to shitpost and commit thoughtcrime in peace, and now I feel compelled to protect myself.
What can I google to find detailed steps to setup the type of system you are describing?
Brandon Garcia
Can people encrypt code into .png? Computer newfag here, try to touch down on what is toxic, what isn't... .png is toxic, YES?
Brandon Torres
Your MAC address doesn't matter, it's only visible to your local network
Elijah Hill
If you are going to google that stuff then you should use someone elses wifi.
Why? The NSA uses a system of building/flagging profiles based on what you search (This is where PRISM comes into play)
Google, "how to build tor raspberry pi router"
Google, "how to connect router to vpn"
Then, for the raspberry pi, google, "how to use vpn"
Also for the 2nd layer vpn I suggest you google VPNGATE (free academic vpn)
For the 1st layer vpn you could just buy a vps (I suggest OVH) and google, "how to set up a vpn server on Ubuntu"
it matters if he is stealing wifi
Levi Carter
Can you explain to a semi-retard why 1 layer of VPN isn't enough?
Dylan Sanders
They're going to track you regardless. Might as well do what you can to shake them off.
Nolan Gomez
>implying the tracking isn't automated >implying they don't have the money and resources to track everyone Sorry, but you're not safe by any means, tripfriend.
Levi Davis
I have a VPS with OpenVPN running. I just use it because the VPS has a 100Gb/s line compared to my 20Mb/s line. So torrenting is insanely fast on it. The OpenVPN is really just for shits and giggles since I know it adds 0 privacy
Benjamin Mitchell
Let's say you don't do anything but use a vpn.
Then your ISP can't see your traffic, only the bandwidth consumption and the IP you connect to (the vpn).
That only protects you from your ISP and possibly from some 3rd party services that want to track you.
However if the govt sees this IP after (for example) you hack into something, then they just need to order the VPN service to hand it over. If they aren't within the US or an ally then they just have informants break into it.
The point isn't to have 2 VPNs as much as you need a 3 hop system (that's why tor is designed the way it is).
You use the top VPN layer to hide what you are doing from your ISP.
You use the second layer (tor or encrypted proxy) to hide what you are doing from the first VPN.
The second layer (tor or proxy) can't see where data is actually coming from or what the data actually is. It is only passing encrypted data between proxies.
The third layer vpn can see your traffic, but not where it comes from.
Now let's go back to the govt scenario. They get logs from the 2nd VPN and now arrive at a proxy/tor. There are no logs and no way to trace it back to the person.
The second vpn is also great because it hids the fact that you use tor. So you don't get captcha'd and flagged across the internet.
Angel Hall
Another benefit of the first vpn layer is that it hides the use of tor, which flags you with an ISP and gets you put on a watch list.
Don't take the watch list so seriously, you get put on it for almost anything.
Let's say you visit a website that is outside of the US, you're now on a watch list.
Let's say the site is within the US but has ads from another country, well you indirectly visited the site. You're now on a watch list.
Know a cousin that knew a guy that lived next door to a terrorist 10 years ago? You're now on a watch list.
Didn't know the cousin that knew the guy, etc? You're still on the watch list.
Eli Green
Shh, don't tell anyone but I'm gonna save your flag anyway
Wyatt Bennett
That makes sense
But the whole govt having informants break in to get my log history angle
If I'm just shitposting and don't want to have my IP to be directly fished into a huge database, 1 layer is enough right?
Levi Gutierrez
The fact that you use the VPN gets you on a watch list.
If you want to use a VPN, but don't want to be on a watch list, then buy a vps and set up a vpn server.
Make sure the VPN server is within the US and then have it forward traffic to the vpn of your choosing.
That should be fine for you. ....just noticed you aren't in the US. You have a different set of rules in your country. You're logged no matter what, just use a vpn outside of your country that resides in a country not friendly to Denmark.
Leo Myers
So if you are not using a vpn to access tor then everything is fine right
Juan Roberts
no
Andrew Watson
Based Cyprus.
Jordan Taylor
They don't, simple as that.
They gather so much data they have no idea what to do with it, so they store it. And use different algorithms to pour through the data. They find a red flag and they might investigate further, but they don't have the resources to check every single person on the internet.
Not to mention that if they actually want to get to a proxy that is say in germany, they need to get the data from wherever it is, and to get the data they need the approval of the government of the country the servers are.
If the person in question is someone spreading "terrorism" and "hatespeech" i suppose they might even press further. But using tor for example gives you adequate protection to shitpost, because the government would have to cut through so much red tape that it wouldn't make it worthwhile.
The government and the forces spying aren't some superhuman hacker gods, and they certainly don't have the key to every software and server on the world.
Christopher Flores
i can see now
James Sanders
You can also do timing analysis. It would surprise me if the NSA, GCHQ and friends didn't do that to VPN services all the time, especially on the shadier VPN services.
Kayden Robinson
>leaf
Gabriel Hernandez
Yeah, it's real. Of course the best solution is to develop an immaculately clean spirit. I'm working on that but in the mean time I've chosen to investigate methods for shielding myself.
Austin Fisher
Hard to say what the NSA/CIA can actually see or not.
But for sure using a VPN puts another few check marks in your file. Raises you up a level, etc. They'll be more interested in your regular traffic now.
Ayden Williams
If you are using Windows or Mac OS, then yes, obviously you're being tracked. I'm just going to assume you're not quite that incompetent and therefore that you're using Linux. VPNs are good, not great. If you want more security than a VPN, use Tor. If you want more security than Tor, use TAILS. If you want more security than TAILS... stop using the Internet.
Jeremiah Baker
>t. pedo
Jaxon Allen
>thinking https provides anonymity lulz Yes, by all means use https. But use that to hide from the kid next door using a packet sniffer, not to keep your traffic private from your ISP or the feds.
Jack Mitchell
The Feds have all kinds of back doors built into hardware and software, it's a fucking joke.
All major tech companies are collaborators with the US government, desu it's pretty damn hard to hide on the internet.
Best off just not using it to avoid surveillance. That's why Trump said what he did about using couriers.
In the future the government will be able to build digital hologram recreations of citizens using full spectrum data collection.
Instead of you being locked away for 20 years they will create 200,000 sentient holograms of you being tortured in an infinite variety of different ways.
By obscuring your digital data trail the governments simu-recreations are inevitably less accurate and you suffer less overall.
Before you laugh me off, please consider the possibility you were a wealthy, handsome and successful businessman that happened to offend an autocrat. Maybe the original you is in a cell somewhere and the you that is reading this is one of near infinite simu-recreations being tortured by being forced to live a life of mediocrity and frustration. Now multiple that frustration by a billion and you understand how punishment, deterrence and data collection intersect.
Nicholas Campbell
>They gather so much data they have no idea what to do with it
AI technology will change this though
>tfw you get fired in 2045 because you used to shitpost on a mongolian fishing board