VPS Questions General

1. Which companies in the US allow you to rent a VPS anonymously, with bitcoin or cash, and without your name, identity verification, etc.? If none in the US, what about overseas?

2. Are most IPs of VPS services blocked or flagged by sites like Facebook, Twitter, POF, Meetme, etc.?

3. When using a VPS, can administrators at the company steal site passwords, keystrokes, etc. from you and view your screen if they want?

4. Say you set up on OS on the VPS, and you encrypt your OS with full disk encryption, like it was on a hard drive - can the company get your password? If their servers are seized, will your portion be encrypted? What if you are only using part of a shared VPS?

5. How hard is it for someone who doesn't know how to code or even command line (lel) to set up a VPS, connect to it, and use it?

6. Correct me if I'm wrong, but you can rent a VPS, install an OS like Debian+Whonix on it, and use it as if it were a computer, correct?

Bump for curiosity.

>Correct me if I'm wrong, but you can rent a VPS, install an OS like Debian+Whonix on it, and use it as if it were a computer, correct?
But that's not the purpose

>When using a VPS, can administrators at the company steal site passwords, keystrokes, etc. from you and view your screen if they want?

Yes, it's their computer, essentially.

>When using a VPS, can administrators at the company steal site passwords, keystrokes, etc. from you and view your screen if they want?

curious on this one...

So, just how fucking retarded do you have to be to not understand how easy this would be? They literally have access to the ENTIRE system. That means all virtual devices, all RAM, storage, etc. Even if you encrypt your files, if they're decrypted on the VPS, the key is in memory.

There is absolutely no gaurantee of privacy on a VPS.. It's like handing someone a piece of paper with writing on it, and asking them not to read it.

>1. Which companies in the US allow you to rent a VPS anonymously, with bitcoin or cash, and without your name, identity verification, etc.? If none in the US, what about overseas?

None. Quite literally none.

>1. Which companies in the US allow you to rent a VPS anonymously, with bitcoin or cash, and without your name, identity verification, etc.? If none in the US, what about overseas?

Never hosted in the US, there are a couple of good hosters overseas though, i can't recommend anyone specific, depends on what you are after.

>2. Are most IPs of VPS services blocked or flagged by sites like Facebook, Twitter, POF, Meetme, etc.?

Some are some are not, do your research.
In general if they allow shady shit like spamming etc they are generally more prone to beeing banned.

>3. When using a VPS, can administrators at the company steal site passwords, keystrokes, etc. from you and view your screen if they want?

Yes they could, it's on their hardware, so even if you encrypt your drives the key still resides in memory.
Nothing prevents them or law enforcement to pull your RAM blocks and do a cold boot to recover keys.
And thats if you are actually renting a physical server, in a VPS environment you only rent a virtual machine, which means they run the hypervisor, which means there are ways to do everything they want to do, including everything you mentioned.

>4. Say you set up on OS on the VPS, and you encrypt your OS with full disk encryption, like it was on a hard drive - can the company get your password? If their servers are seized, will your portion be encrypted? What if you are only using part of a shared VPS?

See above.

>5. How hard is it for someone who doesn't know how to code or even command line (lel) to set up a VPS, connect to it, and use it?

Not really hard, the command line bit will require a bit of fumbling if you are not familiar.
The hard part is running it with proper security in mind so not every pajeet can pop your box.

>6. Correct me if I'm wrong, but you can rent a VPS, install an OS like Debian+Whonix on it, and use it as if it were a computer, correct?

You could, but then whats the point ?

Keep in mind VPSs are not running directly on physical hardware. They VMs. That's what the V in VPS means. Of course the hypervisor has full and direct access to everything that goes on in the guest OS, including being able to extract encryption keys and credentials from memory. And most VPS providers also maintain hooks into the guest OS in addition to the hypervisor's introspection capabilities. They need to be able to manage their infrastructure effectively.

You should also be extremely suspicious of any VPS service that claims to offer anonymity. It's either being run by a law enforcement agency as a honeypot, or it's being run by a criminal outfit that doesn't give half a shit about the security of your data.

What if my main goal was to purely have an anonymous, private VPN with a clean IP that isn't banned from several sites? How easy is that to set up? To where, using a personal computer with Tor, I could post/use a site that blocks Tor, while still using Tor to connect to the VPN/clean IP, using a VPS to do so?

>And most VPS providers also maintain hooks into the guest OS
That sounds scary as fuck.

>anonymous, private VPN with a clean IP that isn't banned from several sites?
If you're not too concerned, you could also just pay a VPN provider.
>How easy is that to set up?
Not hard at all, there's pre-made scripts that set up OpenVPN on any Linux system.

>What if my main goal was to purely have an anonymous, private VPN with a clean IP that isn't banned from several sites?

They way i do it is i have a friend who runs a VPS/VPN company, and i know he would never sell out to government bullshit or spy on his customers, i know this because i worked there for a while.
Find someone who you think you can trust.

>How easy is that to set up?

Easy if you are familiar with basic unix administration, there are tons of material online that can teach you those skills.
Everything else is practice.
Use an old desktop pc, hook it up to your lan and start playing around with it over your network, never touch the computer itself, only interact with it over it's net interface (once you've got that setup locally of course).

>To where, using a personal computer with Tor, I could post/use a site that blocks Tor

They generally block the exit nodes, so you could use tor to connect to your vps, and use that as an endpoint.

My main problem is that the sites I want to use block Tor and every VPN under the sun, and make all users logging in from a non-US IP verify their phone number, etc. So I'd want a US VPS/private VPN, but I can't seem to find a VPS provider in the US that allows anonymous rentals+bitcoin/cash/whatever.

The problem with VPN providers is that their IPs are all banned from many sites.

I have no friends, but thank you for the advice and practice suggestion, I will try. And yes, that's what I was saying regarding Tor, purely using the VPS as a clean exit.

If the site you want to visits does these things it's probably not worth the hassle mate.

>every VPN under the sun, and make all users logging in from a non-US IP verify their phone number,
If they go that far, common VPS hosters are going to be blocked too.
also what said

There's not much you can do in this situation, except searching for VPN providers that aren't blocked (there are some that advertise e.g. Netflix availability)

Reddit respects your freedom and allows Tor and VPN's

It's for a...special project, let's say.

I suspected as much with common VPS hosters being blocked. Oh well. Maybe I can get phone verification from someone online when asked by the site.

But it's full of socialists who want to take 70% of working peoples' money and give it to drug addicts, criminals, and stupid people.

I realize the answer to this is going to be "NO", but I'm hopefully someone here has a creative answer.

Is there any way to have a secure VPS where the XEN/KVM host can't spy on you? Essentially whats to stop a fag working for linode or digital ocean from just mounting my disk from host OS and snooping all my biz secrets?

Does such a thing as provably secure VPS exist?

As you guessed the answer is no.
It's a core fundamental property of Virtual Machines that the hypervisor has to have full access to everything that goes on in the VM.

You could in theory buy a physical server and host your own hypervisor.
But that would not stop someone from cold bootin your ram if he has physical access and your server is running.