TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

We have successfully completed our migration to RAM-only VPN infrastructure

360 pointsby dgavrilovover 1 year ago

14 comments

INTPenisover 1 year ago
This is really cool, you&#x27;d expect any VPN provider that cares about security and transparency to act like Mullvad. Some pour thousands of dollars into forcing influencers to say they care about security, while others focus on actually improving security.<p>And it&#x27;s all open source btw. <a href="https:&#x2F;&#x2F;github.com&#x2F;system-transparency&#x2F;stboot">https:&#x2F;&#x2F;github.com&#x2F;system-transparency&#x2F;stboot</a>
评论 #37584764 未加载
评论 #37584391 未加载
infofarmerover 1 year ago
Not to provoke predictable responses, but I find it interesting that the tech-talented VPN providers are not using BSD in favor of Linux, especially with requirements like diskless operation, kernel customization, and tighter security.
评论 #37586637 未加载
评论 #37594451 未加载
HPsquaredover 1 year ago
I wonder about those VPNs that say &quot;we don&#x27;t log or store anything&quot;. That may be the case, but they probably just send a continuous stream of data to the law enforcement &#x2F; intelligence services or whoever instead of storing it themselves. They can then correctly say &quot;WE don&#x27;t log&quot;.
评论 #37585560 未加载
评论 #37585835 未加载
评论 #37584995 未加载
评论 #37584635 未加载
评论 #37585958 未加载
评论 #37585150 未加载
评论 #37584841 未加载
评论 #37585387 未加载
评论 #37584611 未加载
评论 #37585070 未加载
评论 #37584851 未加载
评论 #37587158 未加载
评论 #37587294 未加载
评论 #37584768 未加载
kwanbixover 1 year ago
One thing that I always wondered from VPNs.<p>Let&#x27;s say a pedophile uses Mullvad to get forbidden images, isn&#x27;t the VPN liable?<p>I mean, the law enforcement will see that the IP was from Mullvad&#x27;s office, so I assume they are the ones doing it? How do they avoid this?<p>It is a real doubt. Maybe stupid, but real.
评论 #37584047 未加载
评论 #37583977 未加载
评论 #37584073 未加载
评论 #37584598 未加载
评论 #37584027 未加载
评论 #37584464 未加载
PaulHouleover 1 year ago
&quot;They&quot; will just spray the machines with liquid nitrogen, pull them out of the rack, put the DRAM in a thermos w&#x2F; LN2 and read the data at their leisure.<p><a href="https:&#x2F;&#x2F;ieeexplore.ieee.org&#x2F;document&#x2F;8388826" rel="nofollow noreferrer">https:&#x2F;&#x2F;ieeexplore.ieee.org&#x2F;document&#x2F;8388826</a>
评论 #37585577 未加载
评论 #37589135 未加载
评论 #37587750 未加载
评论 #37585671 未加载
tamimioover 1 year ago
Still doesn’t protect you against hardware based backdoors, or other types of backdoors like memory injection or supply chain, to get data on the fly<p>&gt; When servers are rebooted or provisioned for the first time, we can be safe in the knowledge that we get a freshly built kernel<p>Any info what’s the period of time doing so? Do you provision them every day, week? An hour maybe? The more the period the less chance of some attack vectors.
w1nst0nsm1thover 1 year ago
In north america and europe, VPN are required by law to keep logs of your use of vpn (site you visit, inscription email,...) for 1 or 2 years.<p>Most VPN company advertise they do not keep logs of your browsing...<p>Which would be in infraction with european and american laws.<p>So I don&#x27;t what to think of diskless VPN.
nodesocketover 1 year ago
Great point brought up in the comments that VM’s allow for snapshotting of entire memory state as well. So something to be aware of.
dheeraover 1 year ago
&gt; freshly built kernel, no traces of any log files, and a fully patched OS<p>Wouldn&#x27;t using a disk in read-only mode accomplish the same thing?
评论 #37587311 未加载
nashashmiover 1 year ago
&gt; All of our VPN servers continue to use our custom and extensively slimmed down Linux kernel, where we follow the mainline branch of kernel development.<p>The custom server is a niche security point. While every server is continously researched and patched, we cannot expect the same from a a server like this. If someone were to find a security hole, an attacker would purchase it and no one else would ever know the system was compromised.
Nevermarkover 1 year ago
Nice work!<p>But, if anything should be a decentralized anonymous crypto-paid service, it should be a VPN network.<p>Centralized VPNs are still a single point of failure privacy risk. We have to trust they don&#x27;t share our identity&#x2F;account info and activity.<p>I am surprised dVPNs are not THE first rationale given for crypto. I.e. since separately and together they (ideally) have a clear comparative advantage over other alternatives for strong privacy.<p>A performant global open-standard dVPN could become an indispensable layer of web access.
评论 #37587080 未加载
评论 #37589434 未加载
评论 #37587156 未加载
评论 #37587276 未加载
mika69over 1 year ago
Can somebody explain in more detail - what does this mean for the user? What are pros and cons?
评论 #37583655 未加载
评论 #37583695 未加载
crabboneover 1 year ago
Does pmem count as RAM?
heyraghabover 1 year ago
1.1.1.1?