all 9 comments

[–][deleted] 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 2 fun -  (5 children)

All VPN's are logging you. Even if they say they don't, you can't verify that, so you have to assume they do.

[–]noice 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 2 fun -  (2 children)

Do you have any insight on this previous exchange I had about VPNs?

back in my day : ssh or vpn aren't even commercial, we buy vps and tweak it as we wanted. That's safer than nowadays 'honeypot' vpn

I had casually wondered if people had used their vps's for that purpose. Just run openvpn on it or something? Also just pondering, could the purveyor of the server also get basically the same information from you as a commercial VPN could? Then you'd lose the "security through obscurity" benefit

https://saidit.net/s/technology/comments/6kt3/the_eu_with_cheers_from_the_fbi_is_dismantling/pda0

[–][deleted] 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 2 fun -  (0 children)

Sorry, I don't.

[–]JasonCarswell[S] 1 insightful - 2 fun1 insightful - 1 fun2 insightful - 2 fun -  (0 children)

As I said above:

Know anything about open-source self-hosting VPNs and or federating them? That seems like a potentially good course, if one must.

I don't expect to be bullet proof. But I won't make it easy for them. I'd settle for bullet resistant.

[–]JasonCarswell[S] 1 insightful - 2 fun1 insightful - 1 fun2 insightful - 2 fun -  (1 child)

Sage advice. Assume they're recording everything and have omnipotence (ie. miracle quantum decryption computers).

Know anything about open-source self-hosting VPNs and or federating them? That seems like a potentially good course, if one must.

I don't expect to be bullet proof. But I won't make it easy for them. I'd settle for bullet resistant.

[–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

[–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Use a root-accessible server you really control so have rented somewhere you regard as safe (Germany from ~ 50€ per month and Switzerland from ~70€ up per month with unlimited traffic and root access) or one that is actually standing somewhere you have access to. Then pay for it with company money and configure it to not log your access. Idk if this is more trustable but at least i can imagine it to be when this / these machine(s) are doing a lot of traffic.

This only is affordable as a private person imho when you have at least one or two other company applications running on this machine paying for these bills.

. .

This also is the most comfortable way to get around access restrictions that a company you are working for might have implemented (just use your home computer or maybe even a raspberry as vpn in this use-case). I made this my standard operation method years ago when i worked for a big German telecommunication company because i couldn't submit a ticket every time there was a link i had to look at (but wasn't accessible because they had some very restrictive sub- and global domain blocks: e.g. every url ending in .ru or .tv wasn't accessible) to handle another ticket or problem that i just pulled out of my own inbox or our backlog. But since we were the team that had to get to run all the iphones of the highest empty suits in this company with an infrastructure that actually only was build for blackberries you possibly can imagine now at how many russian bluetooth- and registry-"hacks" i regularly had to look at.

This became tolerated by my direct superior after i automated the ticket sending to the firewall team with python and they drowned in my tickets alone. :) After a week or so my boss said he can't change company-wide firewall rules and restrictions (because the team actually doing this stuff was located somewhere in the Philippines) but he also didn't want me to send 10+ tickets everyday on my own behalf so i was allowed this.

Last but not least (when doing this at home) i also advise setting up a cron job for macchanger with a 6-hour intervall longest or on login of changing both your IP4 and IP6 mac for the network interface you actually are using for internet access just to have another level of paranoia-defense set up.

You possibly technically also just could piggyback you neighbors WLAN but i don't advise this because not only this is illegal but it is quite hard to get a nice rainbow table for your use case.

[–]Algebruh 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (1 child)

https://saidit.net/s/piracy/comments/g60/that_one_privacy_guys_guide_to_choosing_the_best/ Mullvad is the easy answer. Mullvad paid for with bitcoin bought with monero is the paranoid answer. Real answer is it's unfortunate that you have to trust your VPN provider, other users have made that point for me. The install Gentoo wiki has a decent amount piracy related shit. I'd get a VPN router if I were going to share a service with my entire house, you can buy one if you're not comfortable making one. Edit: Insomnia strikes again, I'd really look into what /u/ElifromtheBook wrote. That seems far more relevant to your question that the basics I'm familiar with, and avoid IP vanish or anything else hosted in the 5 eyes. It's also worth noting that the EU has taken a stance against VPNs and encryption lately

[–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

I use expressvpn and have it set to panama for places like this. I wouldn't go online without it, especially here in Australia.