all 18 comments

[–]HiddenFox 5 insightful - 2 fun5 insightful - 1 fun6 insightful - 2 fun -  (0 children)

A pretty good article. Be sure to read the comments of said article as they are very insightful and help bring perspective and balance.

[–]bobbobbybob 5 insightful - 2 fun5 insightful - 1 fun6 insightful - 2 fun -  (0 children)

My take is that whatever measures you take to hide yourself, technology is only a couple of years away from defeating that, and the big actors store everything.

So, unless you just want 2 years of extra freedom before inevitable jail, don't do illegal things on the internet.

As yet, I can still say "the holocaust is a lie" where I live, but you can bet that even with my anonymous profiles, with their fake life stories, and my networking hygiene, I'll cease saying it once it is illegal here.

and VPNs were always a easy way to advertise to TLAs that you want to be up to no good.

But then I got busted for messing around with ECHELON in the 90s, and have had my visits from the glowies, so learnt fast

[–]billfolddog 4 insightful - 1 fun4 insightful - 0 fun5 insightful - 1 fun -  (3 children)

I disagree strongly with this article for the following reasons:

  1. When you use a single-layer VPN (the most common use case) your ISP cannot snoop on your traffic. Your ISP is the first place the government goes to get your browsing history and internet activity, and your ISP is the party most likely to sell your personal information. A VPN might do all of these things, too, but the hostile actor would have to know which VPN you subscribe to in order to get your data. If the government wants to build profiles for all "political radicals," the government would first ask your ISP (who wouldn't know anything) and then the government would have to ask each VPN provider you are likely to be using in order to get your data. This process is not only costly, but it is also more likely to generate public backlash, because at least one VPN service is going to publish the government's request online for the lulz.

  2. A dual-layer VPN solution counters most of the complaints in the article. In a dual layer VPN solution, the first VPN knows your IP address and that all of your traffic is routed to another VPN service. The second VPN can read all of your web traffic, but does not know your originating IP address or who you are. (Make sure the second layer is purchased with bitcoin or the like.) This solves most of the problems described by the original article.

[–]adultmanhwa 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (2 children)

actually what kind of data is visible to ISP any way? is my data sent to the internet also part of that? I mean when I fill the forms etc.

[–][deleted] 3 insightful - 3 fun3 insightful - 2 fun4 insightful - 3 fun -  (5 children)

Choosing a VPN not based in the 14-Eyes territory goes a long way to insuring privacy, as they can use any such government letters demanding info as toilet paper, while your ISP (and VPNs under 14-Eyes control) must comply. Multi-hop VPNs are slightly more secure, as they add an extra layer of complexity the TLAs must circumvent. A multi-hop VPN based outside the 14-Eyes jurisdiction, having a 'no-logs' policy (backed up by its TOS and an independent certification agency), which is routed through TOR is the 'gold standard', and remains unbreakable...unless you make the same retarded mistakes made by that Silk Road guy.

[–][deleted]  (4 children)

[deleted]

    [–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (3 children)

    Unfortunately there appears to be at least anecdotal evidence that ISPs are actively monitoring for TOR use, as well as playing snitch for the TLAs, who in turn consider TOR users 'Persons Of Interest'.

    https://blog.torproject.org/being-targeted-nsa?page=3

    https://www.cnet.com/news/nsa-likely-targets-anybody-whos-tor-curious/

    https://www.washingtonpost.com/news/the-switch/wp/2013/10/04/everything-you-need-to-know-about-the-nsa-and-tor-in-one-faq/

    Concealing TOR use from the ISP is the first step towards better privacy.

    [–][deleted]  (2 children)

    [deleted]

      [–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (1 child)

      You think so, huh?

      https://www.theguardian.com/world/2013/aug/01/new-york-police-terrorism-pressure-cooker

      Another one I cannot find now got a visit from a TLA, for looking up 'yellow cake recipe'...apparently on a watch list as code word for some explosive.

      [–][deleted] 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (4 children)

      if you need to stick that $3 somewhere, consider paying for email!

      [–]Vigte 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (3 children)

      What services would you recommend?

      [–][deleted] 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (2 children)

      mailbox.org and Tutanota

      [–]Vigte 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

      Thank you, good sir!

      [–]icebong 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

      I love the UI and UX of tutanota

      [–][deleted] 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 2 fun -  (6 children)

      I never thought about using something like GitHub to post articles.

      [–][deleted]  (5 children)

      [deleted]

        [–][deleted] 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (4 children)

        I just use Neocities, which works on TOR. I also think GitLab works the same way as GitHub, and I have an account on the former.

        [–][deleted]  (3 children)

        [deleted]

          [–][deleted] 3 insightful - 2 fun3 insightful - 1 fun4 insightful - 2 fun -  (2 children)

          [–][deleted]  (1 child)

          [deleted]

            [–][deleted] 3 insightful - 2 fun3 insightful - 1 fun4 insightful - 2 fun -  (0 children)

            yw