Are VPNs actually any good for protecting privacy or are they just a 'meme'?
Are VPNs actually any good for protecting privacy or are they just a 'meme'?
Host your own vpn for 5$/mo through amazon or digital ocean or
Swiftonsecurity is blowing hot air out his roleplaying asshole.
Tay is just being a contrarian edgelord. I can't really blame her for it since there are many autists out there who believe VPNs are a magic bullet, but writing all VPNs off as "you just want to feel like a leet haxor" is asinie.
>use VPN
>flags up
>they use hardware backdoor to just track you from your end rather than the network's end
Not totally a meme, but not the cure-all people make them out to be.
the whole idea behind a vpn is your isp no seeing what your looking but you should also use tor for extra protection
This.
I think you're not familiar with how VPNs / network connections work. Which is fine, it's not easy stuff and marketing / services don't make it easier.
Normal internet usage is like sending a ton of envelopes out in the mail. Some go to netflix, some to Sup Forums, some to google, a bunch to youtube, etc.
Using a VPN is like sending crates of unmarked packages to a single address. And when that address is a business that sells re-distribution, people start to put two and two together.
Someone sending mail to a few address? No one bats an eye. Someone sending out tons of crates to a single address? People get called.
The is one of the most retarded things I've ever we read on Sup Forums. Your ISP would only see your traffic leaving via an encrypted tunnel and exiting at the VPN provider. That only tells them that you subscribe to a VPN provider, big fucking deal. Use a VPN provider that doesn't store logs, such as pia. All they can tell anyone who inquires is that you use their service, they have no logs to turn over.
??? Yes that was my point. That the ISP would still know that you're using a VPN and that the point was making is valid.
>VPN provider that doesn't store logs, such as pia
>they have no logs to turn over
Proof?
>Use a VPN provider that doesn't store logs
You're using a VPN to get around ISPs storing logs.
So riddle me this - where do you think VPNs get internet access from?
Using a VPN doesn't send a red flag. Millions of people with jobs use vpns from home every fucking day. If you honestly think you're less secure (via raising a red flag) by using a VPN than not using one at all, you're a retard.
torrentfreak.com
You have no idea what a VPN tunnel is do you? Stop posting.
many jobs require using a vpn like in the banking industry and even if you do not use a vpn at home many use them in public areas
>proof!
Well, colour me pleasantly surprised!
>Using a VPN doesn't send a red flag.
It can be differentiated against normal traffic and then backdoored. The NSA would only need to have the data warehouse to store what they collect. Do you even automate?
Explain what's wrong with my analogy.
you need to research the vpn provider in order to see if they comply with the laws in your country
I'm not going to explain encryption and authentication to a normie
The point put forward by still stands.
I don't know about privacy but they let me use youtube / etc from here in China...
you use a fucking vpn that is not hosted in your county or a country that complies with your county's laws or the eye's program.
He is going beyond that, my good niglet. You will want to discuss traffic profiling instead.
What is there to explain? The data packets are sent through an encrypted tunnel to a third party who then forwards those packets on to their destinations. Responses are sent to the third party who sends them through the tunnel back to the original sender.
It just exactly like sending crates full of letters to someone to redistribute. If you are caught up in the encryption and actual authentication schemes then learn how to compartmentalize concepts you autist.
Thank you user.
You're a retard or a shill. I really don't care if you spew misinformation, I'm unaffected.
Expect a visit from your good neighbour the officer shortly
alright then we should all be paranoid about unknown cars outside of our houses then
Put up or shut up bitch. I did my putting up, looks like you can't.
Is not paranoia is they are in fact out to get you
so what about all the banking employed that use vpn to access the banks internal networks. do all those connections get compromised. or what about other government employees that use a vpn to connect to internal networks
>muh Bill Nye the scientific goy tier explanation
>muh if you use a VPN the government will think you're suspicious!!! Better go completely unprotected instead
Literally not worth the effort
Do take a look at the Aquafresh branch of OpenVPN
openvpn.fox-it.com
You too
>Better go completely unprotected instead
I never said that. My point is that there is no difference between the two. So it's not better to go unprotected. It's that there is no protection.
It's comical that you think a VPN would protect you. But so far you've shown no knowledge of VPNs, basic networking, or computer security.
Think of it in terms of surveillance. THen you might see what I mean.
Not him, but raw VPN may get you some attention. Instead of dismissing it or surrendering, try a way around it. An option could be to wrap it in HTTPS for example in addition to using TCP:443.
Got a dmca through my digital ocean vpn, torrents are against their terms
HTTPS / TCP 443 isn't going to protect much. The VPN connection is already encrypted - there is no seeing in. The bigger problem is that all traffic leaving your home connection will have the VPNs IP address. The encrypted packets still need an address to get to the destination.
so what everyone is fucked regardless
what hardware backdoor are they using then
according to last post i linked it does not matter if you use that you are fucked
I use it to prevent ISP and copyright faggots when I'm torrenting movies/tv shows/games, not government. I feel like the government won't reveal that a VPN provider is being watched over some fucking movie being downloaded, I'm sure they're looking for more severe shit before blowing their load.
If the government wants, they will get access to your shit so no point fighting it. Just don't be a terrorist fuck or a pedophile fuck that should be shot at sight then you'll be okay.
> be arab
> love lolicon
shit.
>The VPN connection is already encrypted - there is no seeing in
Indeed, it is useful for obfuscation and layer4 firewalls, but deep packet inspection will show you aren't using https itself. You can verify that on Wireshark, it's quite educational!
That's why you want to use an https proxy with, yes, a second layer of SSL.
Example: snikt.net
It will be most useful when you are indeed browsing http[s] as the traffic will genuinely look like https and have allegedly the same (or negligibly more) bandwidth.
>be loli
>love arabcon
:^)
Of course, it's not a matter of whether but of when. Fortunately, you can research the tools to delay it.
How does https hide the destination address smartypants?
> he thinks he's hot shit because he's heard of wireshark and he googled the first vpn/ssl link he could find and posted it even though it's basically not relevant
It will indeed look like you're browsing one server all day long. A more elaborate setup could involve multiple servers and round robin, and before you realise it you are de facto making a tor or i2p clone.
read the thread faggot
Unfortunately traffic to that can also be profiled. And that's before we get into things like Deep Packet Inspection
I'm just sharing what works for me for escaping a layer 7 firewall and what I learned in the process, which does come in very handy here if you do take a moment to read
>VPNfags still think VPN providers don't log them
That's why I mentioned https tunneling previously:
>not reading the thread
>not hiring a molvanîan vpn in shuffled bitcoins
if i needed that level of security, i wouldn't use my home connection
HTTPS does not hide or in any way obfuscate the TCP/IP headers with the VPNs address. Firewall bypasses don't apply because whether a firewall blocks or allows a connection - it still sees it. And that's what the concern is, the connection being seen.
What's important is that you both(?) think this will actually protect you. While they're arresting you it'll give me more time to download in peace.
That is indeed one shortcoming if you don't have access to a proper gateway into which to vpn. Do share what is your solution then. Tails? Living in a jurisdiction with lax torrenting laws?
It hides the fact that you're using a vpn. The connection will be seen, but unless someone checks who the IP belongs to, it will look like you're just browsing another https website.
This is definitely useful if you're not allowed to use a vpn and can for example be used to circumvent the great firewall of china.