Don't use VPN services by [deleted] in DecentralizeAllThings

[–]billfolddog 4 insightful - 1 fun4 insightful - 0 fun5 insightful - 1 fun -  (0 children)

I disagree strongly with this article for the following reasons:

  1. When you use a single-layer VPN (the most common use case) your ISP cannot snoop on your traffic. Your ISP is the first place the government goes to get your browsing history and internet activity, and your ISP is the party most likely to sell your personal information. A VPN might do all of these things, too, but the hostile actor would have to know which VPN you subscribe to in order to get your data. If the government wants to build profiles for all "political radicals," the government would first ask your ISP (who wouldn't know anything) and then the government would have to ask each VPN provider you are likely to be using in order to get your data. This process is not only costly, but it is also more likely to generate public backlash, because at least one VPN service is going to publish the government's request online for the lulz.

  2. A dual-layer VPN solution counters most of the complaints in the article. In a dual layer VPN solution, the first VPN knows your IP address and that all of your traffic is routed to another VPN service. The second VPN can read all of your web traffic, but does not know your originating IP address or who you are. (Make sure the second layer is purchased with bitcoin or the like.) This solves most of the problems described by the original article.

I want a saidit mascot by [deleted] in whatever

[–]billfolddog 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 2 fun -  (0 children)

I like raccoons.

How are you managing multiple SSH connections in Linux? by dissent in Linux

[–]billfolddog 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

You can, but I highly recommend you use your ssh config file instead.

https://linuxize.com/post/using-the-ssh-config-file/

If you format it correctly, you can just type ssh myserver and the correct username, port number, and cryptographic keys will automatically be used.

Even better, many applications will refer to your config file. Nautilus can mount an SSH target as attached media, and it will use your SSH config file to streamline configuring the mount point. In many cases, this is the only way to make that work.