TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Don't Use VPN Services

408 pointsby ductionistover 5 years ago

60 comments

thothamonover 5 years ago
While it&#x27;s true that your VPN provider _may_ be lying about their &quot;no logging&quot; policy, at a minimum, you get additional layers of protection. Your source IP is masked. A subpoena would be required to reveal your source IP, and perhaps your VPN provider is telling the truth about not keeping logs. If your VPN endpoint is in a different country than your network endpoint, then the legal obstacles get even higher.<p>Surely you shouldn&#x27;t depend on that alone. Tor would be a wise additional layer of protection, if applicable. But to suggest that you get no privacy benefit at all from a VPN is like saying your host may be compromised, so you might as well use regular telnet rather than SSH.
评论 #21329994 未加载
评论 #21330288 未加载
评论 #21336781 未加载
评论 #21329786 未加载
评论 #21330192 未加载
评论 #21330583 未加载
评论 #21335310 未加载
评论 #21329522 未加载
评论 #21331199 未加载
linsomniacover 5 years ago
&quot;... because the provider can see all your traffic!&quot;<p>However, if you don&#x27;t use a VPN: Your ISPs (Broadband, coffee shop, whatever) can see all your traffic!<p>20 years ago I passed <i>ALL</i> my traffic on my laptop through a VPN, I just happened to run my own. But back then much less of the standard traffic was encrypted. Now, pretty much all web traffic is encrypted. So that makes the VPN less of a concern, IMHO. Depends on what you&#x27;re doing though...<p>There was this one time I went to Defcon. Installed a scratch laptop for it. The firewall on it would only allow DHCP and OpenVPN on the physical interfaces.
评论 #21330066 未加载
评论 #21330423 未加载
tomxorover 5 years ago
I mention this every time this comes up but it&#x27;s info worth spreading... &quot;sshuttle&quot;, make any server into a VPN without VPN server-side software, this takes the pain out of doing your own VPN, gives you far more obscurity, lots of flexibility and in my experience it also performs much better - which I believe is due to the TCP deconstruct-reconstruct vs traditional VPN which does TCP over TCP. The only disadvantage is it&#x27;s only for TCP (no UDP or multicast).<p>For routing all your internet it&#x27;s as simple as this (on the client only, no server setup):<p><pre><code> sshuttle -r user@1.2.3.4 0&#x2F;0 </code></pre> That&#x27;s it... server requirements are met by almost anything, you don&#x27;t need root access, but it does need python, which most distros have by default. Now you can use your own little obscure server, yes it&#x27;s not invulnerable a VPS provider can still look at you if they wish, but it&#x27;s far less of a target than a purpose built consumer VPN provider.<p>It&#x27;s also far more powerful for slicing up and mixing subnets or only routing specific targets ... for example unblock a specific site, but don&#x27;t re-route other traffic:<p><pre><code> sshuttle -r user@1.2.3.4 sci-hub.tw </code></pre> [edit]<p>Minor issue worth mentioning, not to disappoint people trying this out - it&#x27;s currently necessary to use the -x option to exclude the server itself from being routed on Linux, I think this is due to a kernel bug? which is a little annoying, hoping this will go away eventually. This is not relevant to BSD or Mac, although on Mac you have other kernel bugs to worry about in XNUs network stack.<p><pre><code> sshuttle -r user@1.2.3.4 -x 1.2.3.4 0&#x2F;0 </code></pre> [edit]<p>As &quot;icelancer&quot; has pointed out bellow, please note that using your own server ties your activity to your identity more definitively if you are the only one using the server and you pay for the server in your name. Not being a purpose built consumer VPN makes it a less likely target through significant obscurity, however in the event it IS targeted, it&#x27;s uniqueness will make it easier to associate activity with you via the VPS provider.<p>&gt; This also ties your identity to a provider definitively. That&#x27;s fine, as long as you tell people that&#x27;s what is happening. A good consumer VPN that isn&#x27;t a garbage one offers plausible deniability.
评论 #21329587 未加载
评论 #21329580 未加载
评论 #21330957 未加载
评论 #21333466 未加载
评论 #21329505 未加载
评论 #21332434 未加载
unicornfinderover 5 years ago
This post makes good arguments, but there&#x27;s a very real reason to use a VPN provider over your own server - plausible deniability. With a VPN your traffic is mixed in with many, many other users&#x27;, whereas with your own server, any traffic coming from that IP can safely be presumed to be yours.
评论 #21328876 未加载
bArrayover 5 years ago
Other reasons you might want to use a VPN:<p>* Geoblockers - Much media content is blocked based on geolocation, specifically geolocation based on your IP. (Netflix, Youtube, etc.)<p>* IP blacklist - I know a few people that have inherited a blacklisted IP simply through unlucky ISP IP allocation.<p>* ISP logging - So not a hostile ISP, but one that actively tries to log your data. (If you live in Europe, this is almost definitely happening. Apparently in the US ISPs even sell this data.)<p>* Speed - A few people report being able to get a faster network connection. (I&#x27;m not entirely sure why this is the case, but I can imagine there being edge cases where this is possible.)<p>Setting up your own VPN is NOT solution to every problem mentioned here, especially if you want to switch server location on a whim or are not technically minded.
评论 #21331103 未加载
评论 #21331112 未加载
jupedover 5 years ago
The primary reason people use VPN services, which articles like this always fail to address, is best illustrated at this URL: <a href="https:&#x2F;&#x2F;iknowwhatyoudownload.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;iknowwhatyoudownload.com&#x2F;</a>
评论 #21330138 未加载
评论 #21329015 未加载
评论 #21329896 未加载
评论 #21331348 未加载
评论 #21330497 未加载
vescheover 5 years ago
<a href="https:&#x2F;&#x2F;thatoneprivacysite.net&#x2F;#detailed-vpn-comparison" rel="nofollow">https:&#x2F;&#x2F;thatoneprivacysite.net&#x2F;#detailed-vpn-comparison</a><p>Sure, you&#x27;re always trusting a VPN at their word that they don&#x27;t log, the above gives a detailed analysis of which ones you probably shouldn&#x27;t trust. You can always host your own: <a href="https:&#x2F;&#x2F;github.com&#x2F;n1trux&#x2F;awesome-sysadmin#vpn" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;n1trux&#x2F;awesome-sysadmin#vpn</a><p>You can also VPN chain (l2iptables), tunnel over TLS, etc. That gist post is pretty dumb imo
评论 #21328668 未加载
octorianover 5 years ago
This actually reminds me of an episode that happened to me many years ago. Back then, it was &quot;web anonymizers&quot; (not VPN providers) that were all the rage. These programs would maintain a database of open proxies, and route peoples&#x27; web activity through those proxies.<p>Well, I had Apache misconfigured just long enough to get picked up by one of these apps. For years afterward, my server logs were chock full of attempts at logging into various accounts via HTTP. I seriously had thousands of Yahoo! username&#x2F;password pairs just sitting in plaintext inside my server logs.
S-E-Pover 5 years ago
&gt; And remember that it is in a VPN provider&#x27;s best interest to log their users - it lets them deflect blame to the customer, if they ever were to get into legal trouble.<p>Hmmm? If you don&#x27;t have record of it, the courts don&#x27;t do much, at least in the US. If they subpoena you, and you don&#x27;t have logs, nothing ever comes out of it. Outside of fines and things of that nature.<p>&gt; The $10&#x2F;month that you&#x27;re paying for your VPN service doesn&#x27;t even pay for the lawyer&#x27;s coffee, so expect them to hand you over.<p>How do you think insurance works, or why airlines habitually overbook? A trivial word problem if you will: If you had 10,000 users, you were subpoena&#x27;d and only 100 users did anything worth prosecution, that&#x27;s what. For one lawyer, drinking a $10 coffee (or two $5 dollar) every week day for a month. that&#x27;s 20 days, $200 a month. $2,400 annually. Assuming in this example only 1% of your users need defending, that&#x27;s 99% of your coffee budget you don&#x27;t have to worry about! For 10,000 users, a yearly subscription pulls in about $1,200,000 (we aren&#x27;t doing any adjustment for taxes and all that garbage). If 99% of your users are behaving themselves.. or at least not doing something bad enough for the courts to take notice (which in the digital age, things like piracy are white noise) that means you still have $1,188,000 to help you in those, typically blanket cases (i.e. a court case in which 20 of your users were downloading illegal movies, and MGM got really upset). Since if you aren&#x27;t logging, these infractions are dealt with in aggregate usually, since it can&#x27;t be quantified. So number of lawsuits &lt; bad users.<p>That&#x27;s not bad, if all your lawyers needed was coffee monthly, then you could support, with 99% of your users cash, 495 lawyers coffee for a year! more than enough coffee to defend your business. Don&#x27;t forget you can still use the &quot;blood money&quot; you got to buy them coffee!<p>The basic principle behind my oversimplified, and somewhat tongue-in-cheek example was to remind you that insurance is a lucrative business. I wonder how they survive if your monthly cost for liability (up to $500,000) isn&#x27;t $500,000 per month!?!
danShumwayover 5 years ago
Reposting the last response I gave when this article came up.<p>----<p>&gt; Your IP address is a largely irrelevant metric in modern tracking systems.<p>I don&#x27;t believe this for one second.<p>Your IP address on its own is not sufficient to identify you. That doesn&#x27;t mean your IP address is not helpful in identifying you.<p>If you have Javascript disabled, it is a heck of a lot easier to identify you with a combination of an IP address, user agent, and OS than it is to identify you without the IP address cutting down the pool of potential visitors.<p>On top of that, if you&#x27;re targeting me and do a geo-location of my IP address, it will get you within 5 miles of my house. That&#x27;s close enough that you&#x27;ll know which county I&#x27;m in, which with a few other easily-obtained pieces of information will let you pull up my voter registration, which will give you my exact street address.<p>Of course, you could mitigate this by setting up your own VPN on something like Linode, but unless you&#x27;re regularly rotating IP addresses, you&#x27;ve just traded a pseudo-identifier that multiple people&#x2F;devices share for a persistent identifier.<p>This argument comes up all the time, and I have never heard anyone explain it in a way that passes my sniff test. If you want me to stop using a VPN, you need to do a lot better than just claiming that IP addresses don&#x27;t matter -- you need to show some kind of evidence to back that up.<p>----<p>Broadcasting your IP address to every website you&#x27;ve ever visited is a completely valid concern that gets hand-waved out the wazoo whenever this subject comes up.<p>I&#x27;ve sent bug reports to sites that publicly tied IP addresses to comments&#x2F;accounts so anyone could track your movement patterns over time. Yes, that info can be useful to an attacker trying to deanonomyze you. Yes, that info can be used to link users together. Yes, that info can be used to narrow the pool of potential visitors so other fingerprinting techniques are more powerful.<p>It is blanketly ridiculous to claim that an approximate county-level geolocation isn&#x27;t a useful data-point to attackers. If IP addresses weren&#x27;t useful, the Tor project wouldn&#x27;t be going to such lengths to hide them.
评论 #21329710 未加载
alkonautover 5 years ago
I use a VPN because I want a proxy, and for e.g iOS it seems a VPN is the easiest way to set up a proxy.<p>The article lists several reasons to use VPNs but isn’t the biggest one these days simply to circumvent geographical content limitations for online services such as video streaming? Nearly everyone I know has used a VPN service at some point, and if you asked any of the non-technical ones what it <i>is</i> they might say ”a think that lets me watch the game broadcast when I’m in another country”.<p>People want proxies and the VPN providers provide VPNs that work like proxies. I can’t really see the downside to using the VPN as a proxy?
cracker_jacksover 5 years ago
A terrible summary of why VPNs are useful. Goes on and on about privacy with no mention of bypassing censorship. It must be nice living in a place where you don&#x27;t have to worry about access.<p>There&#x27;s no point in privacy without access.
devyover 5 years ago
The title should be renamed to &quot;Don&#x27;t Use 3rd Party VPN Services&quot;.[1]<p>On-prem VPN deployments with solutions like AlgoVPN[2] from TrailOfBits is still very useful. Let alone mass majority of the the corporate IT&#x27;s internal VPNs that is required for some workforces to perform their jobs remotely on public Internet.<p>[1]: <a href="https:&#x2F;&#x2F;gist.github.com&#x2F;joepie91&#x2F;5a9909939e6ce7d09e29#gistcomment-2197521" rel="nofollow">https:&#x2F;&#x2F;gist.github.com&#x2F;joepie91&#x2F;5a9909939e6ce7d09e29#gistco...</a><p>[2]: <a href="https:&#x2F;&#x2F;github.com&#x2F;trailofbits&#x2F;algo" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;trailofbits&#x2F;algo</a>
评论 #21329495 未加载
评论 #21329071 未加载
icelancerover 5 years ago
&quot;There is no way for you to verify that, and of course this is what a malicious VPN provider would claim as well. In short: the only safe assumption is that every VPN provider logs.&quot;<p>This is demonstrably false; look at any VPN provider that was subpoenaed and unable to produce documentation.
kryogen1cover 5 years ago
&gt;Because a VPN in this sense is just a glorified proxy. The VPN provider can see all your traffic, and do with it what they want - including logging.<p>This is a tautology. If you use it as a proxy, then its a proxy. VPNs arent for this, and so are bad at it.<p>VPN use case is either to securely leave a network (hotel Wi-Fi, airport wifi) or to securely get to a network (home resources, corporate resources). If you want a proxy, find a proxy.
评论 #21328926 未加载
评论 #21328910 未加载
评论 #21329356 未加载
johnjunglesover 5 years ago
What about just setting up your own VPN on a cloud provider or a raspberry pi? You’d still be responsible for the traffic flowing through but at least you wouldn’t have ISP logging, get around geoblockers, keep a secure connection in public WiFi’s, fantastic for devops people who want to have local connections for debugging networking things on aws&#x2F;gcp&#x2F;cloud providers, etc...<p>I think you mean that you shouldn’t think of a VPN as an anonymous traffic tool like they advertise.
评论 #21332355 未加载
computerexover 5 years ago
What a myopic viewpoint. ISP&#x27;s can and do sell customer data:<p>www.cnbc.com&#x2F;amp&#x2F;2017&#x2F;03&#x2F;28&#x2F;congress-clears-way-for-isps-to-sell-browsing-history.html<p>It&#x27;s doesn&#x27;t take a logical leap to infer that a company whose entire purpose and business model is to provide anonymization as a service is less likely to sell out its own customers than the ISP&#x27;s.<p>Yes VPN&#x27;s can log despite claiming they don&#x27;t. But the well known ones are highly incentivized to do as they claim because lying would destroy trust and would ultimately destroy their business. Governments are also more likely to target giant national ISP&#x27;s than some VPN provider whose servers are in some very liberal and consumer leaning countries outside the US. Also securing your own VPS on the internet and managing it without getting pwned is well outside the expertise of most people and is probably not recommended.
jchwover 5 years ago
Although I agree with the general notion, social proof and a good track record are not bad indicators. I will always recommend Mullvad if you are looking for a VPN service that is trustworthy. I think VPN services that advertise a lot are a little sketchier, though surely some of them <i>must</i> be decent... maybe PIA?
评论 #21330547 未加载
tootahe45over 5 years ago
Before anyone buys a vps from Lowend talk like he recommends, most of the providers on there are trash-tier and massively over-sell their services which is why they seem cheap but performance ends up very poor. And why would i trust a vps vendor with 10 customers over a VPN provider?
badrabbitover 5 years ago
Use to have this view,now conceded that a vpn provider with good reputation and accountability is best. Your local ISP sell whatever data or inject whatever content thet desire,and your rights mean little if your contract stipulates they can sell this access to a 3rd party and this 3rd party can then resell analyzed or raw data to anyone including your own government. If you perform methodical risk analysis,you will find having the ability to damage reputation of your first-hop provider is an ideal leverage. Never negotiate from a position of weakness (e.g.: ISP or Tor exit nodes)
bloody-crowover 5 years ago
Even if you assume that VPN provider is listening and analyzing all your traffic, it&#x27;s still preferential to your internet service provider doing the same thing. Fost starters, the internet provider just knows more about you. You probably have a contract with them, they know your exact physical location and they have your SSN. A malicious actor from within internet provider having access to all this information could potentially blackmail you by revealing your porn logs to your spouse, or your unsavory private reddit history to your employer etc.<p>Second, your VPN provider could be in a different country, and that would make data mining your traffic slightly less interesting to them. It&#x27;d also make data acquisition via subpoena of some sort from your country slightly more bureaucratic.<p>Third, if you have reservations about your VPN provider, you can just cancel your account and go to a different one. Changing VPN providers takes 5 minutes, while changing internet service provider can take months, or in some cases might not even be possible.
throwaway13337over 5 years ago
This is silly.<p>Most people use VPNs to get out region restrictions.<p>These are getting more and more common due to local governments making laws that affect the whole internet - think GDPR - that individual site owners do not want to abide by so they block IPs. VPNs solve this very real problem for those still wanting access to the content.<p>They&#x27;re also used for subverting content region licensing. For example, with Netflix.
评论 #21328903 未加载
评论 #21329725 未加载
breatheoftenover 5 years ago
Off topic but — anybody know a good&#x2F;recommendable vpn service that supports MacOS without requiring third party software and which allows inbound access to the external ip associated with the service ...?<p>I need to ssh back to my laptop frequently because of some annoying restrictions with a service provider I use (heroku). I _can_ do shenanigans with ssh tunneling on a publicly accessible server I control - but it’s actually pretty annoying to work that way in my scenarios.<p>I’ve tried a few vpn services that offer “static ips” but the services I’ve tried filter inbound connections to that ip ... does anyone know a good vpn service that can effectively gives me a public IP address so I can make inbound connections to my developer machine while I’m random shitty coffee shop WiFi ...?
smurdaover 5 years ago
“remember that it is in a VPN provider&#x27;s best interest to log their users - it lets them deflect blame to the customer, if they ever were to get into legal trouble”<p>Disagree. It is always easier for the legal team to say, “sorry we don’t store the logs” as a way to absolve themselves.
p0ccover 5 years ago
The title is misleading because the article focuses on using VPN providers to obfuscate traffic when this is one use case of VPN technologies. The gestalt types of VPN usage are:<p>* Remote Access VPN: Connect to resources on your corporate network. An example of this is you&#x27;re in a coffee shop on holiday and need to access a corporate resource.<p>* Site-to-Site VPN: Connect networks on two sites together. An example of this is you&#x27;re in a branch office and need to connect to a resource in HQ.<p>Note that VPN providers give you a limited Remote Access VPN to <i>their network</i>, which they control. They can do whatever they want to your now-decrypted traffic before they send it out to the internet. If you want to obfuscate your traffic, Tor is a better candidate.
评论 #21328936 未加载
评论 #21329978 未加载
评论 #21329032 未加载
dontbenebbyover 5 years ago
Being able to use airport wifi (or other public wifi) is actually a pretty big deal IMHO.<p>I really value not having to constantly leave my phone on, blasting my location to anyone who cares to ask.<p><a href="https:&#x2F;&#x2F;www.vice.com&#x2F;en_us&#x2F;article&#x2F;nepxbz&#x2F;i-gave-a-bounty-hunter-300-dollars-located-phone-MicroBilt-zumigo-tmobile" rel="nofollow">https:&#x2F;&#x2F;www.vice.com&#x2F;en_us&#x2F;article&#x2F;nepxbz&#x2F;i-gave-a-bounty-hu...</a><p>(I self host my VPN, so I&#x27;m fairly confident the provider isn&#x27;t going to jeopardize their entire business model to add extra analytics. Sites I visit get the IP of the VPN, and conversely my ISP sees my traffic going to a random server in Denver. It&#x27;s win-win.)
评论 #21330857 未加载
otakucodeover 5 years ago
&gt;There is no way for you to verify that, and of course this is what a malicious VPN provider would claim as well. In short: the only safe assumption is that every VPN provider logs.<p>If the VPN provider has been ordered by a US court to produce log information, and they have appeared in court responding that it is not possible for them to do so as such logs do not exist, and the court has accepted this as true, that is adequate &#x27;proof&#x27; in my eyes. It is something which puts them in the position of being extremely legally liable for in a way that advertising &#x27;no logs&#x27; does not, since prosecution for false advertising is a joke.
评论 #21330987 未加载
babyover 5 years ago
I agree with the content, but I would recommend dsvpn instead of the suggested solutions.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;jedisct1&#x2F;dsvpn" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;jedisct1&#x2F;dsvpn</a>
评论 #21330922 未加载
linsomniacover 5 years ago
Aside: 15 years ago all of our employee laptops passed all of their traffic over our own VPN. One of my employees wanted to quantify how much having all our traffic go to our server space was slowing it down.<p>He ran a series of tests comparing latency and throughput of directly visiting sites on his home Comcast connection, vs. the VPN. Generally, the VPN was significantly faster.<p>I wasn&#x27;t entirely surprised by this. Our facility had multiple high quality connections (Level-3, InterNAP), and one of those traffic optimizers that would add intelligence beyond just BGP.
评论 #21329869 未加载
systematicalover 5 years ago
The biggest value I&#x27;ve seen from VPNs is when certain networks block SSH. This happens to me all the time when staying in hotels. For my work I need SSH.<p>I&#x27;ve also had edge-cases where I need to obscure my country of origin. For instance, I couldn&#x27;t stream Game of Thrones via Hulu&#x2F;HBO Go this Summer while in Mexico. For some reason, Mexico is blocked. My VPN solved that.<p>For security? It&#x27;s unlikely to help unless I am on an unsecured wireless network or something like that. Good read nonetheless.
user4142over 5 years ago
Now, with DoH, VPNs will be nore relevant if you don&#x27;t trust our IPS.<p>Today, if you change you DNS to another resolver, your IPS won&#x27;t bother because majority will not change and you can pass under their radar.<p>With DoH, IPSs will be forced to log filtered&#x2F;mapped IP requests so they can keep doing whatever they&#x27;re doing today with DNS queries.<p>So, when DoH matures, IPS won&#x27;t see your DNS queries but it won&#x27;t matter for them any more as they will be seeing all other requests
exabrialover 5 years ago
&gt; ... with increased adoption of CGNAT and an ever-increasing amount of devices per household, it just isn&#x27;t a reliable data point anymore.<p>I know this is not a popular stance on HN, but ipv4 has built in casual anonymization, whereas ipv6 had built in casual identification. Both systems are defeatable, but what bothers me about ipv6 is that the invasion of privacy is the default.<p>Coincidentally, Google, Facebook, et all are pushing ipv6 very hard.
davedxover 5 years ago
This reminds me of the “don’t use sms for 2fa” arguments.
neumannover 5 years ago
This is focused purely on people who think VPN is for privacy&#x2F;security. I use a VPN to get around geo-fencing - in Australia there is a lot of media agreements that mean you can&#x27;t watch stuff here that is free elsewhere without paying for cable or a local streaming company. A small VPN with multiple exits so I can watch content that is free in the US and EU markets.
terrycodyover 5 years ago
This is BS, VPN is an legitimate service and many people rely on such services to do their things, it may pose some potential security issues, but in most cases, it won&#x27;t cause big harm to you even when your credentials leaked.<p>Just try to use a very random username and password, payment can set to pay as a VCC or one time method.
评论 #21452228 未加载
ComodoHackerover 5 years ago
Do random routing features like SecureCore of ProtonVPN add some value? I think they do in terms of anonymity.
jacques_chesterover 5 years ago
These arguments all assume that ISPs are more trustworthy than VPN providers.<p>One of these markets involves competing on security and privacy. One of them involves colluding on influencing FCC policy.<p>So even if a particular VPN provider is inept or corrupt, my expected return on the investment is higher than trusting TWC.
评论 #21328671 未加载
评论 #21328666 未加载
评论 #21329025 未加载
评论 #21329300 未加载
sjyover 5 years ago
Can (2015) be added to the submission title? This hasn&#x27;t been substantially updated since then.
评论 #21329074 未加载
cookie_monstaover 5 years ago
A slightly less breathless analysis from Krebs (2017):<p><a href="https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2017&#x2F;03&#x2F;post-fcc-privacy-rules-should-you-vpn&#x2F;" rel="nofollow">https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2017&#x2F;03&#x2F;post-fcc-privacy-rules-s...</a>
bitLover 5 years ago
How about when you get a VPN from a country that has strong privacy laws due to bad experience with local snitches and which doesn&#x27;t have intelligence-sharing treaty with any other country (including US) - like Romania. Wouldn&#x27;t that be safer?
Havocover 5 years ago
I don&#x27;t get how using a VPS is any better than just going without anything? It&#x27;s got the exact problem as the VPNs...just shifts the end point.<p>Would there be any benefit in using a number of VPS round robin style? I&#x27;ve got access to a handful...
评论 #21328889 未加载
评论 #21328981 未加载
评论 #21328872 未加载
nlyover 5 years ago
I use a third party VPN service to get around the fact that my residence comes with broadband that hijacks all DNS and routes all HTTP (port 80) connections through a Squid...<p>I also feel sharing an IP with many other users adds to the level of anonymity.
评论 #21329076 未加载
hansdieter1337over 5 years ago
If you want privacy use TOR+VPN. TOR for anonymity, a VPN for a “clean” breakout IP. Oh, and make sure to pay for the VPN using a form of anonymous payment. And, make sure that your devices won’t give up your identity.<p>Anonymity is actually pretty hard...
评论 #21329980 未加载
peterwwillisover 5 years ago
I need an IPSec VPN a couple times a year to get around network issues. Trouble is, when I need it, I can&#x27;t connect to it to buy it, and I don&#x27;t want to pay for it year round. Pay-as-you-go IPSec would be great.
ru999golover 5 years ago
that&#x27;s an astonishingly idiotic argument, most of what he talks about also counts for your ISP too. They might log everything too and not tell you about it, but at least my ISP never made their whole business case around protecting my privacy.<p>And also what exactly would be their incentive in building up their infrastructure to facilitate this logging, do you have any idea how much storage space each VPN node in their network would need just to log everything?<p>And even if they were to log everything you are still sharing a IP with hundreds of other people making you less identifiable to at least the websites you are visiting.<p>100% FUD
to-too-twoover 5 years ago
I’m way out of my element here, but would it be plausible in the future for say, Firefox, to offer a simple and free VPN like service? Something in the vein of incognito mode (it’s UX simplicity).
评论 #21329653 未加载
评论 #21330085 未加载
linsomniacover 5 years ago
I&#x27;ve always been amazed at the prices I see for the VPN services, they seem improbably low. Which makes me wonder where they make their money.
评论 #21330591 未加载
sarah180over 5 years ago
The author admits in comments that this is clickbait. Not much to see here except &quot;the providers you trust might not be trustworthy.&quot;
TomMckennyover 5 years ago
It would be nice if there were an independent auditing organization that could confirm an ISP&#x27;s claims.
readhnover 5 years ago
one thing that was not mentioned- your ISP logging your data. Too much of my data in my ISP&#x27;s hands is not a good thing. I&#x27;d rather tunnel out through a &quot;trusted&quot; 3rd party server then give all my data traffic to Comcast or whatever.
Ivover 5 years ago
I wholeheartedly agree and I am surprised to not see Tor mentioned as an alternative.
badsavageover 5 years ago
Hehe, at least someone is talking about it. Online privacy is a dream in the 2010s
drdreyover 5 years ago
Seems to be from 2015
sarimover 5 years ago
Says a person living in a free democratic society...
评论 #21332145 未加载
jaimex2over 5 years ago
Fantastic post. I&#x27;ve long given up trying to explain this to morons paying for NordVPN and similar products.
sidcoolover 5 years ago
Is 1.1.1.1 a dependable VPN?
_57jbover 5 years ago
If it is necessary<p>Run....your....own....vpn
rhackerover 5 years ago
Use a VPN and a proxy.
luggover 5 years ago
&quot;unless you are on a hostile network&quot;<p>Which I consider my ISP.. no, I can&#x27;t just change ISP, I live under five eyes. I don&#x27;t get a choice.<p>This article is rediculous. It&#x27;s just a clickbait title and a whole bunch of ranting saying the exact opposite.
diminotenover 5 years ago
Wasn&#x27;t this already recently posted?<p>Also, it&#x27;s a <i>terribly</i> constructed article, genuinely terrible. Completely wrongly assumes a specific threat model that isn&#x27;t accurate for the target audience.
评论 #21328662 未加载