Using VPS as a secure VPN

I live in a middle eastern shithole and I want to use VPN so I can browse without being detected by my ISP, government, NSA, GCHQ, FBI and FSB.


I am planning to setup an openvpn server listening to port 443 so my traffic appears as if it's a normal HTTPS. The problem here is that the ISP can easily detect that I am connecting to one IP all the time (i.e. the VPN server). Is this more dangerous than just not using any VPN at all? will this make them notice me and monitor me closely?

Other urls found in this thread:

cloud.torproject.org/
stacksocial.com/sales/ra4w-vpn-lifetime-subscription
fossies.org/diffs/ntopng/2.0_vs_2.2/nDPI/src/lib/protocols/openvpn.c-diff.html
twitter.com/SFWRedditVideos

how do you expect any of us to know what kind of things your government does?

OP listen, you are a cell amongst millions of cells, your ISP does not even know you exist. why would you think they'd be monitoring YOU?

by the way which country?

Egypt, the government has recently blocked some websites mostly affiliated with filthy islamists, I have no problem here, the problem that these niggers blocked medium.com, a website I used to browser every day

I am afraid that they are beginning to monitor HTTP and DNS requests.

why can't you use a normal vpn again?

Just use tor with the meek amazon bridge, it makes your traffic look like a HTTPS request to amazon (which it is)

I can, it's a bit more expensive, but I want to use my VPN server for this particular feature which is I can set the port number of the server to 443 which is much more secure

what does that even mean?

you dont even know what those mean? you're lagging behind bro

well your gubmint will know you're hiding your traffic but it'll be encrypted so who cares. using tor would be a much larger red flag if you're doing fishy things

I don't do fishy things, I just want to unblock medium.com and hide my porn http requests from the government and CIA niggers

If you've got an encrypted tunnel between you and your VPS and you don't keep logs on your VPS it doesn't matter if they monitor you more closely.
They can't do shit.

then what's the problem? setup openvpn on your vps, it'll take 2 minutes

the problem like I said is does using VPN make your more noticeable to the government? all your traffic goes in and out from and to one IP address which is the VPN server address. Will this make them more suspicious about you?

yes

you said you're not doing anything fishy

stop being stupid

I know they won't see anything, please read this

lmao man egypt has 92 million population, you should be fine, for them you don't even exist just use whatever you want

So long as the VPS isn't in your country they can't do anything. Assuming 'your country' isn't america.
I mean, if you were in iran then you'd get goons coming in and beating you to death outside your own house but I have to assume that your country isn't that bad.

Unless you're a gay and the US sponsored chechnians want to torture you to death for being a fag.

>I live in a middle eastern shithole and I want to use VPN so I can browse without being detected by my ISP, government, NSA, GCHQ, FBI and FSB.
>Lives in a middle eastern shithole
>Wants help to evade detection
I'd rather that those agencies keep a close eye on you user.

How about using TOR, it's actually made for this shit.

cloud.torproject.org/
Had to look this up, but it seems to have been discontinued for over two years now, due to software maintenance difficulties and bugs.

reported to the NSA, GCHQ, FBI and FSB

[green]Just use your internet without thse gimmicks for normal browsing and opera vpn for porn n medium
???
Profit[/green]

>automated algorithms are incapable of flagging weird network data for a human to look at.

Literally how every fucking spy and network policing agency works.

If you're really worried, rent a vps, install firefox, then browse via rdp or vnc. You can still use your browser for regular stuff, just use the vps for porn and such.

ignore the idiots that don't understand you want access to content locked in your country. get a proper vpn like protonvpn that you even can use for free if you just want to access some sites and call it a day.

>I live in a middle eastern shithole

terrorist detected

>free VPN
Don't do it man. Use OVPN or tor.
>anonymizing http proxy
>multihop
>servers physically have disks removed, loggning disabled, log file set to /dev/null, swap disabled
>run in Sweden with strong protections for VPN services
>owners are a Swedish company with, not some fucking hong kong shell corp

protonvpn offers a free version were you can access one server on one device with limited speed. i use the service since it's cloed beta and it's pretty much the best vpn i've ever used.

>I can, it's a bit more expensive
Why don't you get one of those vpn for lifetime deals at stacksocial? Not sure how good it is but it's cheap at least.

stacksocial.com/sales/ra4w-vpn-lifetime-subscription

ProtonVPN
YIn addition to strong technical security, ProtonVPN also benefits from strong legal protection. Because we are based in Switzerland, ProtonVPN is protected by some of the world's strongest privacy laws and remains outside of US and EU jurisdiction. This means that unlike VPN providers based in a fourteen eyes country, we cannot be coerced into spying on our users.

>Under Swiss law, we are not obligated to save any user connection logs, nor can we be forced to perform targeted logging on specific users.

>ProtonVPN doesn't just protect your browsing traffic, we also protect your DNS queries.

>ProtonVPN comes with Tor support built-in.

>ProtonVPN's Secure Core architecture gives our secure VPN service the unique ability to defend against network based attacks. Secure Core protects your connection by routing your traffic through multiple servers before leaving our network. Secure core servers are located in hardened datacenters in Switzerland, Iceland, and Sweden, protected by strong privacy laws, and operated on our own dedicated networks.

>cheap
>secure

pick one

Openvpn is not a regular TLS(https) traffic. Its easily detected by ntopng and other DPI systems. Run it over stunnel proxy on a vps with legit domain name, TLS cert and a fake website. It will hide the fact that you are using VPN but it still will suspicious as fuck if all your traffic will be heading to a single server. So try to run innocent stuff like torrents, steam or web surfing bot in background.
Shadowsocks is also good. Less stealthy but harder to block.
Also don't use home or mobile connections if it is registered on your Id. Get 4g modem on streets and pay cash.

...

Just say you're doing web stuff on that server over ssh, if not then fuck your cucked ass country.

>Openvpn is not a regular TLS(https) traffic
It is if you use 443 and TCP.

>VPN -> Tor -> VPN
Literally 7 proxies.

No.
fossies.org/diffs/ntopng/2.0_vs_2.2/nDPI/src/lib/protocols/openvpn.c-diff.html

...

Not OP but, also live there: It is a cucked ass country :(