Anyone know where I can trade a VPN subscription? I have an account for PIA with 260 days in it...

Anyone know where I can trade a VPN subscription? I have an account for PIA with 260 days in it, its useless now since my ISP blocked ports used by the VPN and PIA say they can't or won't do anything about it.

Where can I legit trade it without getting scammed?

Other urls found in this thread:

community.openvpn.net/openvpn/wiki/TrafficObfuscation
bestvpn.com/blog/5919/how-to-hide-openvpn-traffic-an-introduction/
youtu.be/Cj3PN5-n108
ntop.org/products/deep-packet-inspection/ndpi/
theregister.co.uk/2016/06/21/kremlin_wants_to_shoot_the_messenger_and_whatsapp_to_boot/
en.wikipedia.org/wiki/Steganography
twitter.com/AnonBabble

...

>ISP blocked ports used by the VPN

wut

I live in a 3rd world shithole, and yes Im serious.

PIA can use port 80, unless you are implying that your ISP blocks http?

Message me [email protected]

>its useless now since my ISP blocked ports used by the VPN and PIA say they can't or won't do anything about it.
they're fucking lying

you can run a VPN over port 443 just fine. To the ISP it will be indistinguishable from a regular HTTPS connection

As far as I understand it, the ports arent completely blocked, it selectively blocks outgoing VPN connections, china style.

ok, I hope you're serious

Pia uses shitty openvpn/l2tp/pptp which could be easily blocked on any port.

Serious

>block openvpn
how do you distinguish it from HTTPS?

also curious about this

if you can tell what the contents of an encrypted packet are, what the fuck is the point of encrypting it

ok been reading about Deep Packet Inspection

>3spooky4me

Doesn't pia have stealth mode that bypasses deep packet inspection?

I know my vpn has it and it's unblockable.

Pedo detected

Name? and PIA didn't mention anything like that.

>my ISP uses DPI
>actually paying for such a service and supporting such bullshit

community.openvpn.net/openvpn/wiki/TrafficObfuscation
bestvpn.com/blog/5919/how-to-hide-openvpn-traffic-an-introduction/
Free software will always win the arms race

Unless you'd rather have no internet at all, most people simply don't have a choice.

why the fuck is an ISP using DPI unless under coercion from the government? all it could possibly do is hurt their business

>being this naive
youtu.be/Cj3PN5-n108

Virtually all isps uses some form of dpi dumbass. Some are even hardware accelerated to fuck your speed if you try to bypass it.

It have unique handshake and there is no protection against conection probe.
You could test it yourself ntop.org/products/deep-packet-inspection/ndpi/
They will just put you in jail for usage of any non-certified encryption.
theregister.co.uk/2016/06/21/kremlin_wants_to_shoot_the_messenger_and_whatsapp_to_boot/
>Citizens using the apps and refusing to let security officials read their messages would be subject to fines of up to 3,000 roubles, officials could be fined up to 5,000 roubles, and legal entities as much as 50,000 roubles.

which is exactly what happens to me when i try to use it (OP).

I'm looking for an alternative actually, do you mind naming that vpn?

>They will just put you in jail for usage of any non-certified encryption.
Then I will hide my bits inside a simulated skype video call

Torguard supports it, but you need to use their own client. Not third party clients allowed. The speed is also inconsistent.

It's meant for people in places like China to bypass the great firewall, not as a way to torrent.


I still can't believe the most popular vpn pia doesn't support dpi. What the fuck.

You know that there will be no presumption of innocence? Any data which could not be decrypted by officials could be named 'encrypted'. Even if it just a proprietary protocol, or you dont have an option to save encryption keys (eg session keys)

You do know what “hiding the bits” means, right?

en.wikipedia.org/wiki/Steganography

Yes, security through obscurity. It will work for a few users, but you cant scale it.

>Security through obscurity
I don't think you understand steganography at all.

Even with perfect information about the algorithm I'm using, please tell me how you are going to distinguish between encrypted data and naturally occurring noise in a video signal.

Answer: Unless you break the crypto, you can't. Therefore, you literally have zero way of proving that I was hiding information in my video call except by actually standing behind me and watching what I'm doing.