|
Post by Polaris Seltzeris on Sept 16, 2017 2:05:55 GMT
The post makes some valid points, but also makes some reasonably large assumptions. I use a VPN on a regular basis, but its not for the purpose of hiding my IP, there are more creative ways to do that if you were that way inclined. I use a VPN because I need to create a virtual network that is geographically difficult to physically link on a traditional LAN. Ultimately using a VPN Service is down to how much you trust your provider, I host my own VPN, but I dont use it to hide traffic, its encrypted sure but thats just so everyone else cant see what im doing if you're a script kiddy. A VPN could very easily be used as a massive MITM attack, but you also have to remember how much data we're talking here, and how insignificant you're going to be on the grand scheme of things... So you're saying the CIA can bypass its own encryption (which is what OpenVPN uses)? It's not like they can use some ancient magic to decrypt AES 256 encrypted OpenVPN traffic. OpenVPN is open source and peer reviewed by the way. Anyways I think that I can trust ProtonVPN a service that literally requires approval from Geneva's equivalent of the Supreme Court before they can give away any customer's information, and the problem there is that their privacy policy doesn't allow them to even have access to such information. Their secure core servers which are hosted in underground bunkers which have their own equipment shipped to them and are the only servers that if they were compromised could log IP addresses are only accessible by staff and that feature alone makes ProtonVPN probably the best out of any other VPN provider. They aren't a random VPN either, they are the same company as ProtonMail which has been up for years without being compromised. Their record is amazing, and yes you do still have to trust ProtonVPN to not be a MITM themselves, but that's easy because I mean it's by proton.
|
|
|
Post by Polaris Seltzeris on Sept 16, 2017 2:07:32 GMT
Also to everyone bragging about having their own VPS servers so that you are completely untouchable, I assume you trust OVH as much you would trust yourself right?
|
|
Cowgomooo12
Club 4000 Member
Vaarwel, afscheid
Posts: 4,894
| Likes: 5,266
|
Post by Cowgomooo12 on Sept 16, 2017 3:48:51 GMT
Also to everyone bragging about having their own VPS servers so that you are completely untouchable, I assume you trust OVH as much you would trust yourself right? Not necessarily bad (provided you keep things private/fake). If you're using OVH as a temporary service, for "bulletproof hosting" needs, it's actually pretty good quality. However, the turnover rate for "bulletproof hosting" is practical one hundred percent. So, expect to migrate servers to a less 'ethical' company. Redundancy is key, for all hosting.
|
|
Wild1145
Club 4000 Member
Inactive Player & Inactive Senior Admin
Posts: 10,414
| Likes: 9,680
|
Post by Wild1145 on Sept 16, 2017 8:34:13 GMT
The post makes some valid points, but also makes some reasonably large assumptions. I use a VPN on a regular basis, but its not for the purpose of hiding my IP, there are more creative ways to do that if you were that way inclined. I use a VPN because I need to create a virtual network that is geographically difficult to physically link on a traditional LAN. Ultimately using a VPN Service is down to how much you trust your provider, I host my own VPN, but I dont use it to hide traffic, its encrypted sure but thats just so everyone else cant see what im doing if you're a script kiddy. A VPN could very easily be used as a massive MITM attack, but you also have to remember how much data we're talking here, and how insignificant you're going to be on the grand scheme of things... So you're saying the CIA can bypass its own encryption (which is what OpenVPN uses)? It's not like they can use some ancient magic to decrypt AES 256 encrypted OpenVPN traffic. OpenVPN is open source and peer reviewed by the way. Anyways I think that I can trust ProtonVPN a service that literally requires approval from Geneva's equivalent of the Supreme Court before they can give away any customer's information, and the problem there is that their privacy policy doesn't allow them to even have access to such information. Their secure core servers which are hosted in underground bunkers which have their own equipment shipped to them and are the only servers that if they were compromised could log IP addresses are only accessible by staff and that feature alone makes ProtonVPN probably the best out of any other VPN provider. They aren't a random VPN either, they are the same company as ProtonMail which has been up for years without being compromised. Their record is amazing, and yes you do still have to trust ProtonVPN to not be a MITM themselves, but that's easy because I mean it's by proton. You have to remember that just because a service tells you that they require something, doesn't mean they can't just give the data out anyway. What I'm saying is that if the CIA wants to get into your traffic, they probably could. As I say, its about trusting the service you use. Personally I have no need for a hidden VPN to hide my traffic, I just want to create a virtual network that is geographically difficult to link any other way. Its only there to allow me to remote into different machines as I need without having to physically be on the same network. I know there are a lot of good services out there, but it is ultimately just a game of trust.
|
|
Wild1145
Club 4000 Member
Inactive Player & Inactive Senior Admin
Posts: 10,414
| Likes: 9,680
|
Post by Wild1145 on Sept 16, 2017 8:34:53 GMT
Also to everyone bragging about having their own VPS servers so that you are completely untouchable, I assume you trust OVH as much you would trust yourself right? For me, I don't need to trust them. I use them simply to allow remote connections into other machines that are not on the same physical network.
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Sept 16, 2017 10:32:21 GMT
i am my own provider so FUCK YOU are you being legit because if you are im being legit
|
|
xfilez
Veteran Member
paint me like one of your french girls
Posts: 2,667
| Likes: 3,303
|
Post by xfilez on Sept 16, 2017 16:33:35 GMT
are you being legit because if you are im being legit that is so fucking cool
|
|
|
Post by mychaeljkmax on Sept 16, 2017 16:40:43 GMT
In my opinion, it depends on the VPN service and the purpose of using it. If you're going to spend money on a VPN service that you could get a free trial for, and you only use VPN services rarely, that's foolish. However, if you intend to regularly use VPN services, purchasing one wouldn't be a bad idea. The only time I ever use VPN services is if I'm in a place where minecraft servers are blocked by a firewall and I want to connect.
Personally, I use a VPN (whenever necessary) called hide.me which has a free trial available, and it's renewable.
|
|
|
Post by Polaris Seltzeris on Sept 16, 2017 16:49:50 GMT
So you're saying the CIA can bypass its own encryption (which is what OpenVPN uses)? It's not like they can use some ancient magic to decrypt AES 256 encrypted OpenVPN traffic. OpenVPN is open source and peer reviewed by the way. Anyways I think that I can trust ProtonVPN a service that literally requires approval from Geneva's equivalent of the Supreme Court before they can give away any customer's information, and the problem there is that their privacy policy doesn't allow them to even have access to such information. Their secure core servers which are hosted in underground bunkers which have their own equipment shipped to them and are the only servers that if they were compromised could log IP addresses are only accessible by staff and that feature alone makes ProtonVPN probably the best out of any other VPN provider. They aren't a random VPN either, they are the same company as ProtonMail which has been up for years without being compromised. Their record is amazing, and yes you do still have to trust ProtonVPN to not be a MITM themselves, but that's easy because I mean it's by proton. You have to remember that just because a service tells you that they require something, doesn't mean they can't just give the data out anyway. What I'm saying is that if the CIA wants to get into your traffic, they probably could. As I say, its about trusting the service you use. Personally I have no need for a hidden VPN to hide my traffic, I just want to create a virtual network that is geographically difficult to link any other way. Its only there to allow me to remote into different machines as I need without having to physically be on the same network. I know there are a lot of good services out there, but it is ultimately just a game of trust. Yes they can, but then that would be violating their privacy policy which means that I can take them to court. They also would have no obligation to even give the data out unless the Geneva supreme court forced them to, so why would they? Yes the CIA could attempt to break AES, but at the same time they would be required to create an even better algorithm because of something you aren't comprehending: national security agencies like the CIA use AES 256. Banks and national security agencies use AES, they can't just break it otherwise they would be putting the economies of 100 countries as well as themselves at severe risk.
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Sept 16, 2017 17:45:45 GMT
|
|
Wild1145
Club 4000 Member
Inactive Player & Inactive Senior Admin
Posts: 10,414
| Likes: 9,680
|
Post by Wild1145 on Sept 17, 2017 14:01:32 GMT
You have to remember that just because a service tells you that they require something, doesn't mean they can't just give the data out anyway. What I'm saying is that if the CIA wants to get into your traffic, they probably could. As I say, its about trusting the service you use. Personally I have no need for a hidden VPN to hide my traffic, I just want to create a virtual network that is geographically difficult to link any other way. Its only there to allow me to remote into different machines as I need without having to physically be on the same network. I know there are a lot of good services out there, but it is ultimately just a game of trust. Yes they can, but then that would be violating their privacy policy which means that I can take them to court. They also would have no obligation to even give the data out unless the Geneva supreme court forced them to, so why would they? Yes the CIA could attempt to break AES, but at the same time they would be required to create an even better algorithm because of something you aren't comprehending: national security agencies like the CIA use AES 256. Banks and national security agencies use AES, they can't just break it otherwise they would be putting the economies of 100 countries as well as themselves at severe risk. True, as I say its all about trust. The company will always end up (Unless they're rather stupid) reserving the right to give information over the law enforcement regardless of court orders. I am sure as I say that if the CIA or NSA or any other of the 3 letter agencies wanted to get access to your data, they would find a way, im not saying they'd need to break AES, I am sure they will have other ways if they wanted, to access your data.
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Sept 24, 2017 7:23:34 GMT
But I don't want skids with their $5 booters orgasming when they see my ip! answer is still no, dont use any vpn dumbass u gonna be track af deal with it
|
|