#[1]Gist [2]atom
[3]Skip to content
(BUTTON)
____________________
[4]All gists [5]Back to GitHub [6]Sign in [7]Sign up
[8]Sign in [9]Sign up
(BUTTON)
{{ message }}
Instantly share code, notes, and snippets.
[10]@joepie91
[11]joepie91/[12]vpn.md
Last active May 24, 2023 00:04
* [13]Star [14]2.2k
* [15]Fork [16]182
[17]Star
[18]Code [19]Revisions 13 [20]Stars 2,236 [21]Forks 182
Embed
What would you like to do?
(<script src="
https://gist.github.com/joepie91/5a9909939e6ce7d09e29.js"
></script>)
Embed Embed this gist in your website.
(
https://gist.github.com/joepie91/5a9909939e6ce7d09e29)
Share Copy sharable link for this gist.
(
https://gist.github.com/5a9909939e6ce7d09e29.git)
Clone via HTTPS Clone with Git or checkout with SVN using the
repository’s web address.
Learn more about clone URLs
<script src="https:/
[22]Download ZIP
Don't use VPN services.
[23]Raw
[24]vpn.md
Don't use VPN services.
No, seriously, don't. You're probably reading this because you've asked
what VPN service to use, and this is the answer.
Note: The content in this post does not apply to using VPN for their
intended purpose; that is, as a virtual private (internal) network. It
only applies to using it as a glorified proxy, which is what every
third-party "VPN provider" does.
* A Russian translation of this article can be found [25]here,
contributed by Timur Demin.
* A Turkish translation can be found [26]here, contributed by agyild.
* There's also [27]this article about VPN services, which is honestly
better written (and has more cat pictures!) than my article.
Why not?
Because a VPN in this sense is just a glorified proxy. The VPN provider
can see all your traffic, and do with it what they want - including
logging.
But my provider doesn't log!
There is no way for you to verify that, and of course this is what a
malicious VPN provider would claim as well. In short: the only safe
assumption is that every VPN provider logs.
And remember that it is in a VPN provider's best interest to log their
users - it lets them deflect blame to the customer, if they ever were
to get into legal trouble. The $10/month that you're paying for your
VPN service doesn't even pay for the lawyer's coffee, so expect them to
hand you over.
But a provider would lose business if they did that!
I'll believe that when HideMyAss goes out of business. They gave up
their users years ago, and [28]this was widely publicized. The reality
is that most of their customers will either not care or not even be
aware of it.
But I pay anonymously, using Bitcoin/PaysafeCard/Cash/drugs!
Doesn't matter. You're still connecting to their service from your own
IP, and they can log that.
But I want more security!
VPNs don't provide security. They are just a glorified proxy.
But I want more privacy!
VPNs don't provide privacy, with a few exceptions (detailed below).
They are just a proxy. If somebody wants to tap your connection, they
can still do so - they just have to do so at a different point (ie.
when your traffic leaves the VPN server).
But I want more encryption!
Use SSL/TLS and HTTPS (for centralized services), or end-to-end
encryption (for social or P2P applications). VPNs can't magically
encrypt your traffic - it's simply not technically possible. If the
endpoint expects plaintext, there is nothing you can do about that.
When using a VPN, the only encrypted part of the connection is from you
to the VPN provider. From the VPN provider onwards, it is the same as
it would have been without a VPN. And remember, the VPN provider can
see and mess with all your traffic.
But I want to confuse trackers by sharing an IP address!
Your IP address is a largely irrelevant metric in modern tracking
systems. Marketers have gotten wise to these kind of tactics, and
combined with increased adoption of [29]CGNAT and an ever-increasing
amount of devices per household, it just isn't a reliable data point
anymore.
Marketers will almost always use some kind of other metric to identify
and distinguish you. That can be anything from a useragent to a
[30]fingerprinting profile. A VPN cannot prevent this.
So when should I use a VPN?
There are roughly two usecases where you might want to use a VPN:
1. You are on a known-hostile network (eg. a public airport WiFi
access point, or an ISP that is known to use MITM), and you want to
work around that.
2. You want to hide your IP from a very specific set of
non-government-sanctioned adversaries - for example, circumventing
a ban in a chatroom or preventing anti-piracy scareletters.
In the second case, you'd probably just want a regular proxy
specifically for that traffic - sending all of your traffic over a VPN
provider (like is the default with almost every VPN client) will still
result in the provider being able to snoop on and mess with your
traffic.
However, in practice, just don't use a VPN provider at all, even for
these cases.
So, then... what?
If you absolutely need a VPN, and you understand what its limitations
are, purchase a VPS and set up your own (either using something like
[31]Streisand or manually - I recommend using Wireguard). I will not
recommend any specific providers (diversity is good!), but there are
plenty of cheap ones to be found on [32]LowEndTalk.
But how is that any better than a VPN service?
A VPN provider specifically seeks out those who are looking for
privacy, and who may thus have interesting traffic. Statistically
speaking, it is more likely that a VPN provider will be malicious or a
honeypot, than that an arbitrary generic VPS provider will be.
So why do VPN services exist? Surely they must serve some purpose?
Because it's easy money. You just set up OpenVPN on a few servers, and
essentially start reselling bandwidth with a markup. You can make every
promise in the world, because nobody can verify them. You don't even
have to know what you're doing, because again, nobody can verify what
you say. It is 100% snake-oil.
So yes, VPN services do serve a purpose - it's just one that benefits
the provider, not you.
__________________________________________________________________
This post is licensed under the [33]WTFPL or [34]CC0, at your choice.
You may distribute, use, modify, translate, and license it in any way.
__________________________________________________________________
Before you comment: Be aware that any non-constructive comments will be
removed. This includes advertising for VPN providers (yes, even when
you phrase the marketing claims like a question), trolling, harassment,
insults towards other people, claims that have already been addressed
in the article, and so on.
If your comment isn't a genuine question or a concrete counterargument
supported by evidence, it probably doesn't belong here.
(BUTTON) Load earlier comments...
[35]@TruncatedDinosour
Copy link
[36]TruncatedDinosour commented [37]Dec 24, 2022
this is the most annoying thread on github, my email is being
spammed by it and every time i take a look here i lose another
braincell, im in the negatives already, jesus fucking crist, get a
life
Dude fucking same. And on top of that every time I click on this
email thread I am always forced to read a 3 year old email from a
guy who called me "an arrogant mother fucker", because that's
apparently the first email I got from this thread, LMFAO!
(FYI gmail doesn't collapse the first email of a thread, a feature
that is handy in many scenarios, but is now annoying as fuck only
thanks to this cesspool of a thread rofl)
lmaoooooooo
Sorry, something went wrong.
[38]@eqn-group
Copy link
[39]eqn-group commented [40]Dec 25, 2022 via email
unsubscribe!
[41]…
Sorry, something went wrong.
[42]@TruncatedDinosour
Copy link
[43]TruncatedDinosour commented [44]Dec 25, 2022
unsubscribe!
[45]…
do you now think i havent thought of that ? i dont think theres a way
to ubsubscribe from singular threads, unless, idk
Sorry, something went wrong.
[46]@eqn-group
Copy link
[47]eqn-group commented [48]Dec 25, 2022 via email
look at the bottom your your email, there is an unsubscribe link
[49]…
------ Original Message ------ From "TruncatedDinosour" ***@***.***> To
"TruncatedDinosour" ***@***.***> Cc "Comment" ***@***.***> Date
25/12/2022 16:46:15 Subject Re: joepie91/vpn.md
[50]@TruncatedDinosour commented on this gist.
-----------------------------------------------------------------------
--------- >unsubscribe! >… <#> > do you now think i havent thought of
that ? i dont think theres a way to ubsubscribe from singular threads,
unless, idk — Reply to this email directly, view it on GitHub
<[51]
https://gist.github.com/5a9909939e6ce7d09e29#gistcomment-4413152>
or unsubscribe
<[52]
https://github.com/notifications/unsubscribe-auth/ATM2XBBN6UQZR4HY
OT7BM6TWPAUIBBFKMF2HI4TJMJ2XIZLTSKBKK5TBNR2WLJDHNFZXJJDOMFWWLK3UNBZGKYL
EL52HS4DFQKSXMYLMOVS2I5DSOVS2I3TBNVS3W5DIOJSWCZC7OBQXE5DJMNUXAYLOORPWCY
3UNF3GS5DZVRZXKYTKMVRXIX3UPFYGLK2HNFZXIQ3PNVWWK3TUUZ2G64DJMNZZDAVEOR4XA
ZNEM5UXG5FFOZQWY5LFVAZDQNJSGY3DMNNHORZGSZ3HMVZKMY3SMVQXIZI>. You are
receiving this email because you commented on the thread. Triage
notifications on the go with GitHub Mobile for iOS
<[53]
https://apps.apple.com/app/apple-store/id1477376905?ct=notificatio
n-email&mt=8&pt=524675> or Android
<[54]
https://play.google.com/store/apps/details?id=com.github.android&r
eferrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_so
urce%3Dgithub>.
Sorry, something went wrong.
[55]@GetAHat
Copy link
[56]GetAHat commented [57]Dec 25, 2022
I think the best use case for consumer VPNs is accessing region-locked
content\websites etc. In case of Russia you literally can't even pay in
some websites even if you have European or American credit card and\or
you are European citizen, and you've set the region to any European
one. Just because of the fact that you're connecting from Russian IP.
To be honest, I use whatever seems working but only turning VPN on for
specific usecases, and turning off immediately after I'm done.
Everything else - yep, it's just stupid. You just giving the data to
some shady unregulated VPN company instead of shady and barely
regulated ISP.
Sorry, something went wrong.
[58]@TruncatedDinosour
Copy link
[59]TruncatedDinosour commented [60]Dec 25, 2022
look at the bottom your your email, there is an unsubscribe link
[61]…
------ Original Message ------ From "TruncatedDinosour" @.> To
"TruncatedDinosour" @.> Cc "Comment" @.***> Date 25/12/2022 16:46:15
Subject Re: joepie91/vpn.md
[62]@TruncatedDinosour commented on this gist.
--------------------------------------------------------------------
------------ >unsubscribe! >… <#> > do you now think i havent
thought of that ? i dont think theres a way to ubsubscribe from
singular threads, unless, idk — Reply to this email directly, view
it on GitHub
[63]
https://gist.github.com/5a9909939e6ce7d09e29#gistcomment-4413152
or unsubscribe
[64]
https://github.com/notifications/unsubscribe-auth/ATM2XBBN6UQZR4
HYOT7BM6TWPAUIBBFKMF2HI4TJMJ2XIZLTSKBKK5TBNR2WLJDHNFZXJJDOMFWWLK3UNB
ZGKYLEL52HS4DFQKSXMYLMOVS2I5DSOVS2I3TBNVS3W5DIOJSWCZC7OBQXE5DJMNUXAY
LOORPWCY3UNF3GS5DZVRZXKYTKMVRXIX3UPFYGLK2HNFZXIQ3PNVWWK3TUUZ2G64DJMN
ZZDAVEOR4XAZNEM5UXG5FFOZQWY5LFVAZDQNJSGY3DMNNHORZGSZ3HMVZKMY3SMVQXIZ
I. You are receiving this email because you commented on the thread.
Triage notifications on the go with GitHub Mobile for iOS
[65]
https://apps.apple.com/app/apple-store/id1477376905?ct=notificat
ion-email&mt=8&pt=524675 or Android
[66]
https://play.google.com/store/apps/details?id=com.github.android
&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26u
tm_source%3Dgithub.
hm. is it for singular threads though ? im scared to get unsubscribed
from all notifications
Sorry, something went wrong.
[67]@LupusMichaelis
Copy link
[68]LupusMichaelis commented [69]Dec 25, 2022
hm. is it for singular threads though ? im scared to get
unsubscribed from all notifications
How do you achieve breathing? Unbelievable. I'd like to point out that
there is an “unsubscribe” button at the top of this very page.
[70]image
Sorry, something went wrong.
[71]@TruncatedDinosour
Copy link
[72]TruncatedDinosour commented [73]Dec 25, 2022
hm. is it for singular threads though ? im scared to get
unsubscribed from all notifications
How do you achieve breathing? Unbelievable. I'd like to point out
that there is an “unsubscribe” button at the top of this very page.
[74]image
didnt look at the top, anyway, thank god, finally i can begin braincell
recovery
Sorry, something went wrong.
[75]@madgoat
Copy link
[76]madgoat commented [77]Dec 27, 2022
[78]@LokiFawkes
The fact you can ONLY connect through a PROPRIETARY app and, unlike
almost every other supposedly safe VPN, you ABSOLUTELY cannot
connect using a standard protocol
You might want to revise your information, or lack thereof.
* Nord allows you to connect however you want (OpenVPN, IPSec, IKEv2,
etc...), you don't need their software.
they've never had a truly independent audit. Parent companies often
own auditors or pay them for a good score.
* So you're telling me that PricewaterhouseCoopers is owned by Nord,
and that they were paid off to make them pass? Man, if that
exclusive information ever got out, that would be bad news for PWC.
Next time look into things before spewing falsities. Sure, you might
not like certain companies, but there's no need to lie about them.
Sorry, something went wrong.
[79]@LokiFawkes
Copy link
[80]LokiFawkes commented [81]Dec 29, 2022
[82]@madgoat Assuming their instructions even WORK (last I had even
touched their site, such instructions didn't even exist because the app
was REQUIRED so they could pass your traffic to their GoogleAnalytics
account), there's still the fact that they lie about data handling.
There's also the fact that not entirely having to use their app does
not mean they don't collect data, only that the proprietary app
GUARANTEES maximum data collection. Even a company that does allow
connection over open protocols can be collecting data, just likely less
data than when you use their proprietary app.
As mentioned, owning an auditor is not the only way to have a conflict
of interest. Money can change hands behind closed doors, and the
dissonance between reality and the score given makes that clear that
PWC is either dumb or paid for. Pick your poison.
For privacy, data collection, and data collection disclosure, Nord is
among the worst rated for a reason. It's run by, say it again, a data
broker.
Sorry, something went wrong.
[83]@aptblog
Copy link
[84]aptblog commented [85]Jan 3, 2023
Using a virtual private network (VPN) improves the security of your
social media accounts by encrypting your internet connection and
masking your IP address and location. This can make it more difficult
for hackers to access your sensitive information and can protect your
privacy when using social media. However, you should not relay on VPNs
alone are for [86]social media security, you need to be aware of many
other security tips for securing your social media accounts.
Sorry, something went wrong.
[87]@LupusMichaelis
Copy link
[88]LupusMichaelis commented [89]Jan 3, 2023
No. Pretend VPN do not improve security in any way. Please read the
article you're commenting about that explains why they are not security
tools at all, and stop puking marketing dump from those snakeoil
vendors.
Sorry, something went wrong.
[90]@LokiFawkes
Copy link
[91]LokiFawkes commented [92]Jan 3, 2023
[93]@aptblog Ad bot spotted. VPN services (glorified proxies) do not
improve your security. In the age of HTTPS and DoT/DoH, your attack
surface is on the client end and the server end. The attack surface is
nowhere in the middle. At best, a man in the middle might get the
hostname of a service you're connecting to at the handshake in the
beginning of a TLS connection, a connection that could last from
seconds to years, and that's if a method of encrypting the SNI (ESNI,
ECH, etc) is not being implemented. Since the Web2 era, in which most
sites are hosted on just a few servers, IP addresses are kinda useless
for spying on users.
Things you can do to protect your browsing habits at home from being
discovered by a MITM such as a hacker or your ISP:
Use DoT or DoH. DoT is superior for security and more lightweight, but
browsers typically require DoH to implement ECH, the current encrypted
SNI standard. Though currently they also hide this feature behind a
config flag, too.
Enable ECH in your flags, even if you won't be able to use it due to
your DNS configuration.
Set up a recursive resolver in your LAN, configure it to connect to
other DNS servers via DoT. This server will cache your queries for a
predefined length of time known as a Time To Live (TTL), either the TTL
of the DNS record or the TTL the resolver has set globally, whichever
is shorter. Hard mode: Use reverse-proxy software to implement DoH with
this server as the DNS server, enabling you to use ECH on your favorite
browser (they really should enable this for using DoT as well)
By encrypting your DNS queries and minimizing the amount of queries
that reach WAN, all people see is you connecting to servers that
usually host multiple domain names. By encrypting the Server Name
Indicator, even the TLS handshake between you and a site will contain
no usable data. At that point, only you and the site you connect to
have any idea what's going on. From there, browser extensions that
block ads and analytics further protect you. You can also blackhole
certain hostnames on your resolver to minimize tracking where browser
extensions aren't an option (mobile, for example) though that can come
with its own set of functionality penalties.
Without the hostname, if a server hosts multiple sites, nobody knows
what you're actually connecting to. They might be able to guess that
yl-in-f101.1e100.net is probably an edge server for google.com, but
they wouldn't be certain that the site is google.com and not, for
example, just a site using Google's cloud services as a CDN.
Sorry, something went wrong.
[94]@arkbg1
Copy link
[95]arkbg1 commented [96]Jan 3, 2023
[97]@LokiFawkes Agreed. At least I hope. His primary arguement is
directly addressed by OP.
[98]@aptblog "(VPN) improves the security of your social media accounts
by encrypting your internet connection and masking your IP address and
location."
vs
[99]@joepie91 " VPNs can't magically encrypt your traffic" & "Your IP
address is a largely irrelevant metric in modern tracking systems."
also,
[100]@joepie91 "claims that have already been addressed in the
article... doesn't belong here."
Sorry, something went wrong.
[101]@aptblog
Copy link
[102]aptblog commented [103]Jan 4, 2023
Defense in depth approach for security and VPN & Social Media Account
Security.
Defense in depth is a security strategy that involves implementing
multiple layers of defense at different points within a system or
network. The goal of defense in depth is to make it more difficult for
attackers to compromise the security of the system or network by
requiring them to bypass multiple layers of defense.
Defense in depth is needed now more than ever as more employees work
from home and as organizations increasingly rely on cloud-based
services and [104]social media is a weak human link in security.
Some examples of different layers of defense that might be included in
a defense in depth strategy include:
Physical security measures, such as locks and security guards, to
protect against physical attacks.
Network security measures, such as firewalls and intrusion detection
systems, to protect against network-based attacks.
Application security measures, such as input validation and
authentication controls, to protect against attacks targeting specific
applications or services.
Data security measures, such as encryption and access controls, to
protect against unauthorized access to sensitive data.
A virtual private network (VPN) is a network technology that creates a
secure, encrypted connection between a device and a VPN server.
This can provide several benefits, including:
Privacy: By routing traffic through the VPN server, a VPN can hide the
device's IP address and make it more difficult for third parties to
track the device's online activity.
Security: The encrypted connection provided by a VPN can help protect
against various types of cyber threats, such as man-in-the-middle
attacks and data leaks.
Geo-blocking: Some websites and services are only available in certain
countries. By connecting to a VPN server in a different country, a user
can "trick" these websites into thinking they are located in the
allowed country, allowing them to access restricted content.
VPN is only one component of a defense in depth strategy, and it should
be used in combination with other security measures to provide the
greatest level of protection.
Defense in depth for a social media account:
Choose strong and unique passwords: Use a password manager to create
strong, unique passwords for your social media accounts, and enable
two-factor authentication (2FA) if it is available. This will help
protect against password-based attacks, such as brute-force attacks or
credential stuffing.
Be cautious with links and attachments: Be cautious when clicking on
links or downloading attachments from unknown sources, as these can
potentially be used to deliver malware or phishing attacks.
Use privacy settings: Use the privacy settings provided by the social
media platform to control who can see your posts and personal
information.
Be aware of scammers and impersonators: Be aware of scammers and
impersonators who may try to trick you into giving away personal
information or money.
Use antivirus software: Install antivirus software on your devices and
keep it up to date to help protect against malware.
Avoid sharing sensitive information: Be mindful of what personal
information you share on social media, as this information could
potentially be used to target you with attacks.
Sorry, something went wrong.
[105]@LokiFawkes
Copy link
[106]LokiFawkes commented [107]Jan 4, 2023 •
edited
[108]@aptblog The application of VPN technology in a defense-in-depth
strategy involves using an actual VPN, not a "VPN" service. VPNs are
used in a defense in depth strategy to connect employees to a private
network, not to serve as a proxy for their WAN traffic. When it does
function as a proxy, this is to keep custody of that traffic until it
goes to the WAN, not to dance around the globe via an untrustworthy
third party. This way, if something leaks to WAN, it leaks through the
company's private network, and is either stopped by the firewall or
cannot be sniffed by the employee's home ISP.
If you are using a VPN service rather than a company VPN for your
defense in depth strategy, you've defeated your whole security model.
The doctrine of defense in depth is also outdated.
For example, "strong" passwords are often short but use a wide
character range instead of being long. They're not memorable, they're
easy for machines to bruteforce, and they're plagued by the need to
write down passwords or save them in a password manager. Passphrases
are king.
For another example, antivirus software as we know it is ineffective.
The most effective antivirus for Windows is Defender, with many
commercial offerings actually spying on you, bypassing Defender (it
disables itself if you have another AV installed) and leaving doors
open for malware whose developer has bribed them for whitelisting to
get through. The most effective antivirus for macOS is in fact is the
Gatekeeper/Notarization/XProtect stack built in to macOS. As for Linux,
there is no real AV offering (just about every offering you see for
Linux is either a scam or a Windows AV scanning on Linux) and the
method of defense is to patch out vulnerabilities and never give anyone
but designated administrators administrative privileges. Just like
macOS, a password is needed when escalating to admin power, and you
must be in the admin wheel to escalate.
Sorry, something went wrong.
[109]@aptblog
Copy link
[110]aptblog commented [111]Jan 5, 2023 •
edited
[112]@LokiFawkes actual VPN and VPN as service discussion is similar to
choosing "Private Cloud" vs "Public Cloud".
Windows Defender a built-in antivirus software for Windows operating
systems is generally effective at detecting and protecting against
viruses and other malware. However keeping your OS up to date with the
latest security patches and updates, enabling virtualization-based
security, and using cloud storage service to store your important files
and documents adds extra layer to security.
The doctrine of defense in depth is a military strategy that involves
positioning defensive forces at various levels or depths in an area in
order to create multiple layers of defense. While the specific tactics
and technologies used in defense in depth may change over time, the
fundamental principles behind this strategy remains relevant.
The doctrine of "Defense in depth" can be applied in a variety of
contexts, including military, cybersecurity, and critical
infrastructure protection.
Doctrine of defense in depth can also be applied to emotional security
or personal security.
Here are some ideas for how to build a defense in depth for emotional
security:
Identify and address sources of stress: Identify the things that cause
you stress, such as work, relationships, or financial issues, and take
steps to address them. This might involve seeking support from friends
and family, seeking therapy, counseling, finding ways to manage your
workload more effectively.
Practice self-care: Take care of yourself physically and emotionally by
getting enough sleep, eating well, [113]exercising, and engaging in
activities that bring you joy.
Build a support network: Surround yourself with people who are
supportive and who you can turn to for help when you're feeling
overwhelmed or distressed.
Develop coping skills: Learn techniques for managing your emotions and
coping with stress, such as deep breathing, meditation, or journaling.
Seek professional help if needed: If you're struggling to cope with
stress or negative emotions on your own, consider seeking help from a
mental health professional or a health coach.
Sorry, something went wrong.
[114]@LokiFawkes
Copy link
[115]LokiFawkes commented [116]Jan 5, 2023
[117]@aptblog No, actual VPN vs VPN service is similar to choosing self
hosted vs public cloud.
Audits of antivirus software showed the best to be Defender, which also
happens to be the one that comes with Windows. Currently, as OS
developers put their money into providing an antivirus, they've proven
to be the best to turn to when protecting the OS they develop.
Virtualization-based security is typically not needed unless you're
downloading shit from Softonic, and even then, most malware you'll be
worrying about can break the hypervisor or simply get sufficient
permissions from the user for the hypervisor not to be a threat to its
goal.
Cloud storage is not a form of security. You're thinking of backup, but
also, it's not a form of backup either. It's not an archival service,
it's a centralized sync service. Centralizing your files to Muh Cloud
can actually make it easier for malware to destroy your data thoroughly
enough that without a real backup you'll be unable to retrieve it.
If the doctrine of defense in depth hasn't embraced long passwords,
it's outdated. End of.
Sorry, something went wrong.
[118]@MandiYang
Copy link
[119]MandiYang commented [120]Jan 8, 2023
Is protonvpn trustworthy? There is no way to confirm it to be
trustworthy but they seem so legit :(
[121]
https://protonvpn.com/blog/is-protonvpn-trustworthy/
Sorry, something went wrong.
[122]@arkbg1
Copy link
[123]arkbg1 commented [124]Jan 8, 2023
Is protonvpn trustworthy? There is no way to confirm it to be
trustworthy but they seem so legit :(
[125]
https://protonvpn.com/blog/is-protonvpn-trustworthy/
I would be curious to know if OP read anything especially convincing in
their lists of reasons to trust them.
Sorry, something went wrong.
[126]@carmellopezhere
Copy link
[127]carmellopezhere commented [128]Mar 8, 2023
I vote for my all-time favourite VPN. [129]StreamVPN is an excellent
virtual private network (VPN) service that offers its users a fast,
secure, and private internet browsing experience. The service is easy
to use and has a user-friendly interface that makes it easy for even
those new to VPNs to navigate.
One of the standout features of StreamVPN is its ability to bypass
internet censorship and geo-restrictions. With servers in multiple
locations, users can easily connect to a server in a different country
and access content that may be restricted in their region. This makes
it an ideal VPN for users who want to stream content from other
countries or access websites that may be blocked.
Another great feature of StreamVPN is its strict no-logs policy, which
ensures that user activity and connection logs are not stored. This
means that users can enjoy a high level of privacy and security while
browsing the internet.
StreamVPN also offers fast connection speeds, which is essential for
users who want to stream high-quality content or engage in online
gaming. Additionally, the service offers excellent customer support and
has a dedicated support team available 24/7 to assist users with any
issues they may encounter.
Overall, StreamVPN is an excellent VPN service that offers its users a
great mix of privacy, security, and functionality. It is a reliable and
efficient VPN that is well worth considering for anyone looking for a
top-quality VPN service.
Sorry, something went wrong.
[130]@GASOLINE
Copy link
[131]GASOLINE commented [132]Mar 8, 2023
I vote for my all-time favourite VPN. [133]StreamVPN is an excellent
virtual private network (VPN) service that offers its users a fast,
secure, and private internet browsing experience. The service is
easy to use and has a user-friendly interface that makes it easy for
even those new to VPNs to navigate.
One of the standout features of StreamVPN is its ability to bypass
internet censorship and geo-restrictions. With servers in multiple
locations, users can easily connect to a server in a different
country and access content that may be restricted in their region.
This makes it an ideal VPN for users who want to stream content from
other countries or access websites that may be blocked.
Another great feature of StreamVPN is its strict no-logs policy,
which ensures that user activity and connection logs are not stored.
This means that users can enjoy a high level of privacy and security
while browsing the internet.
StreamVPN also offers fast connection speeds, which is essential for
users who want to stream high-quality content or engage in online
gaming. Additionally, the service offers excellent customer support
and has a dedicated support team available 24/7 to assist users with
any issues they may encounter.
Overall, StreamVPN is an excellent VPN service that offers its users
a great mix of privacy, security, and functionality. It is a
reliable and efficient VPN that is well worth considering for anyone
looking for a top-quality VPN service.
Says someone that just subscribed to Github. It seems more an
advert/affiliate link.
Sorry, something went wrong.
[134]@Kyr4l
Copy link
[135]Kyr4l commented [136]Mar 9, 2023
I vote for my all-time favourite VPN. [137]StreamVPN is an excellent
virtual private network (VPN) service that offers its users a fast,
secure, and private internet browsing experience. The service is
easy to use and has a user-friendly interface that makes it easy for
even those new to VPNs to navigate.
One of the standout features of StreamVPN is its ability to bypass
internet censorship and geo-restrictions. With servers in multiple
locations, users can easily connect to a server in a different
country and access content that may be restricted in their region.
This makes it an ideal VPN for users who want to stream content from
other countries or access websites that may be blocked.
Another great feature of StreamVPN is its strict no-logs policy,
which ensures that user activity and connection logs are not stored.
This means that users can enjoy a high level of privacy and security
while browsing the internet.
StreamVPN also offers fast connection speeds, which is essential for
users who want to stream high-quality content or engage in online
gaming. Additionally, the service offers excellent customer support
and has a dedicated support team available 24/7 to assist users with
any issues they may encounter.
Overall, StreamVPN is an excellent VPN service that offers its users
a great mix of privacy, security, and functionality. It is a
reliable and efficient VPN that is well worth considering for anyone
looking for a top-quality VPN service.
Bot detected 1000000%
Sorry, something went wrong.
[138]@ElTioRata
Copy link
[139]ElTioRata commented [140]Mar 17, 2023
So, Mullvad isn't trustworthy?
Sorry, something went wrong.
[141]@LokiFawkes
Copy link
[142]LokiFawkes commented [143]Mar 18, 2023
Trust Mullvad as far as you can throw it. Don't expect it to keep your
network traffic a secret any more than any other service, though it
does have less data-broker baggage than many others.
Sorry, something went wrong.
[144]@CostcoFanboy
Copy link
[145]CostcoFanboy commented [146]Mar 28, 2023 •
edited
You can somewhat trust some rare VPNs as some of them made their canary
tactics public and you can observe how the VPN/company interacted with
other court orders in the past.
e.g. Mullvad and Proton
Basically, if they have logs, they just hand them encrypted jargon, if
they have no logs, then nothing can be given.
This gist is somewhat right but too pessimistic.
99% of people use VPNs for geolocation bypass (Netflix or living in an
authoritarian regime) or p2p torrenting, which are fairly valid use
cases.
I'd say Mullvad, Proton and iVPN are trustworthy considering what I've
seen from their responses and what happened during equipment seizures.
List of garbage VPNs that are to be avoided 100%:
* GhostVPN: Owned by ex-malware company
* PIA: Now owned by ex-malware company
* Tunnelbear: Owned by McAfee
* PureVPN: Lied about not keeping logs
* Windscribe VPN: Lied about encryption
* HideMyAss: Lied about not keeping logs
* DoubleVPN: Lied about not keeping logs
* EarthVPN: Lied about not keeping logs
* ProtonVPN: Garbage apps.
* Hola: Malware
Of course, never trust VPNs that are mass-peddled on YouTube channels.
It's all very circumstantial and somewhat "no brainer". Kind of like
how you'd trust pCloud to harbor sensitive data but never Google Drive.
But you can circumvent the whole thing by running Cryptomator on your
Gdrive folder contents locally.
You just have to be smart about it.
As far as the best one, it definitely goes to Mullvad. You don't even
need an identity tied to your payment method.
Sorry, something went wrong.
[147]@Moizsohail
Copy link
[148]Moizsohail commented [149]Apr 3, 2023 •
edited
What if we use openvpn and connect to free vpn providers like
[150]
https://www.freeopenvpn.org/index.php?lang=en. is that safe?
I mean i am just looking to watch anime on pirated sites like
gogoanime. and i don't need a letter knocking on my door.
Sorry, something went wrong.
[151]@isaackielma
Copy link
[152]isaackielma commented [153]May 4, 2023
[154]@ranazain0009 Looks like all these vpn indicated in the website
are logging all consumer traffic and personal data that's stored in
their DB. Is that true or am I paranoid? Just because you pay them,
doesn't mean that they will be ethical. Still giving them all the power
to sell or use your info for nefarious purposes...
Just a thought, please correct me if I am mistaken.
Sorry, something went wrong.
[155]@aedicted
Copy link
[156]aedicted commented [157]May 4, 2023
They most certainly won't log "all consumer traffic" as it would be way
too much to store. Not even the NSA does that or would be capable of
holding all that stuff.
If at all, it will be the meta-data about the connection itself.
Paranoia? Depends on your use case. I'd claim that for a little P2P,
etc. ANY will do it as "investigations" in that regard will stop at the
first visible IP-address and as long as it is not your easily
accessible ISP, I'm yet to hear of any case where they took the effort
to follow up the chain. If you plan "more" or your safety is a stake
like being a Snowden, then cascade several up to your personal level of
paranoia. ;)
Sorry, something went wrong.
[158]@Viral
Copy link
[159]Viral commented [160]May 24, 2023
literally shit for brains
Sorry, something went wrong.
[161]Sign up for free to join this conversation on GitHub. Already have
an account? [162]Sign in to comment
Footer
© 2023 GitHub, Inc.
Footer navigation
* [163]Terms
* [164]Privacy
* [165]Security
* [166]Status
* [167]Docs
* [168]Contact GitHub
* [169]Pricing
* [170]API
* [171]Training
* [172]Blog
* [173]About
(BUTTON) You can’t perform that action at this time.
You signed in with another tab or window. [174]Reload to refresh your
session. You signed out in another tab or window. [175]Reload to
refresh your session.
(BUTTON)
References
Visible links
1.
https://gist.github.com/opensearch-gist.xml
2.
https://gist.github.com/joepie91.atom
3.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#start-of-content
4.
https://gist.github.com/discover
5.
https://github.com/
6.
https://gist.github.com/auth/github?return_to=
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
7.
https://gist.github.com/join?return_to=
https://gist.github.com/joepie91/5a9909939e6ce7d09e29&source=header-gist
8.
https://gist.github.com/auth/github?return_to=
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
9.
https://gist.github.com/join?return_to=
https://gist.github.com/joepie91/5a9909939e6ce7d09e29&source=header-gist
10.
https://gist.github.com/joepie91
11.
https://gist.github.com/joepie91
12.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
13.
https://gist.github.com/login?return_to=
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
14.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29/stargazers
15.
https://gist.github.com/login?return_to=
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
16.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29/forks
17.
https://gist.github.com/login?return_to=
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
18.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
19.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29/revisions
20.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29/stargazers
21.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29/forks
22.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29/archive/060273b2528e3db5a7b676ac6725f3bff3b0520b.zip
23.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29/raw/060273b2528e3db5a7b676ac6725f3bff3b0520b/vpn.md
24.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#file-vpn-md
25.
https://tdemin.github.io/posts/2017-08-13-dont-use-vpn-services_ru
26.
https://write.as/nwz9t04yfjwlv0yj.md
27.
https://schub.io/blog/2019/04/08/very-precarious-narrative.html
28.
http://www.theregister.co.uk/2011/09/26/hidemyass_lulzsec_controversy/
29.
https://en.wikipedia.org/wiki/Carrier-grade_NAT
30.
https://panopticlick.eff.org/
31.
https://github.com/StreisandEffect/streisand
32.
https://www.lowendtalk.com/categories/offers
33.
http://cryto.net/~joepie91/blog/LICENSE.txt
34.
https://creativecommons.org/publicdomain/zero/1.0/
35.
https://gist.github.com/TruncatedDinosour
36.
https://gist.github.com/TruncatedDinosour
37.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4412854#gistcomment-4412854
38.
https://gist.github.com/eqn-group
39.
https://gist.github.com/eqn-group
40.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4413050#gistcomment-4413050
41.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
42.
https://gist.github.com/TruncatedDinosour
43.
https://gist.github.com/TruncatedDinosour
44.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4413152#gistcomment-4413152
45.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
46.
https://gist.github.com/eqn-group
47.
https://gist.github.com/eqn-group
48.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4413221#gistcomment-4413221
49.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
50.
https://github.com/TruncatedDinosour
51.
https://gist.github.com/5a9909939e6ce7d09e29#gistcomment-4413152
52.
https://github.com/notifications/unsubscribe-auth/ATM2XBBN6UQZR4HYOT7BM6TWPAUIBBFKMF2HI4TJMJ2XIZLTSKBKK5TBNR2WLJDHNFZXJJDOMFWWLK3UNBZGKYLEL52HS4DFQKSXMYLMOVS2I5DSOVS2I3TBNVS3W5DIOJSWCZC7OBQXE5DJMNUXAYLOORPWCY3UNF3GS5DZVRZXKYTKMVRXIX3UPFYGLK2HNFZXIQ3PNVWWK3TUUZ2G64DJMNZZDAVEOR4XAZNEM5UXG5FFOZQWY5LFVAZDQNJSGY3DMNNHORZGSZ3HMVZKMY3SMVQXIZI
53.
https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675
54.
https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign=notification-email&utm_medium=email&utm_source=github
55.
https://gist.github.com/GetAHat
56.
https://gist.github.com/GetAHat
57.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4413226#gistcomment-4413226
58.
https://gist.github.com/TruncatedDinosour
59.
https://gist.github.com/TruncatedDinosour
60.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4413309#gistcomment-4413309
61.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
62.
https://github.com/TruncatedDinosour
63.
https://gist.github.com/5a9909939e6ce7d09e29#gistcomment-4413152
64.
https://github.com/notifications/unsubscribe-auth/ATM2XBBN6UQZR4HYOT7BM6TWPAUIBBFKMF2HI4TJMJ2XIZLTSKBKK5TBNR2WLJDHNFZXJJDOMFWWLK3UNBZGKYLEL52HS4DFQKSXMYLMOVS2I5DSOVS2I3TBNVS3W5DIOJSWCZC7OBQXE5DJMNUXAYLOORPWCY3UNF3GS5DZVRZXKYTKMVRXIX3UPFYGLK2HNFZXIQ3PNVWWK3TUUZ2G64DJMNZZDAVEOR4XAZNEM5UXG5FFOZQWY5LFVAZDQNJSGY3DMNNHORZGSZ3HMVZKMY3SMVQXIZI
65.
https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675
66.
https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign=notification-email&utm_medium=email&utm_source=github
67.
https://gist.github.com/LupusMichaelis
68.
https://gist.github.com/LupusMichaelis
69.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4413311#gistcomment-4413311
70.
https://user-images.githubusercontent.com/357873/209477382-caa48e37-3d64-4afc-b4f2-24905546a9b0.png
71.
https://gist.github.com/TruncatedDinosour
72.
https://gist.github.com/TruncatedDinosour
73.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4413386#gistcomment-4413386
74.
https://user-images.githubusercontent.com/357873/209477382-caa48e37-3d64-4afc-b4f2-24905546a9b0.png
75.
https://gist.github.com/madgoat
76.
https://gist.github.com/madgoat
77.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4414333#gistcomment-4414333
78.
https://github.com/LokiFawkes
79.
https://gist.github.com/LokiFawkes
80.
https://gist.github.com/LokiFawkes
81.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4416434#gistcomment-4416434
82.
https://github.com/madgoat
83.
https://gist.github.com/aptblog
84.
https://gist.github.com/aptblog
85.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4422019#gistcomment-4422019
86.
https://aptblogger.com/25-social-media-security-tips-every-marketer-should-know-about/
87.
https://gist.github.com/LupusMichaelis
88.
https://gist.github.com/LupusMichaelis
89.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4422042#gistcomment-4422042
90.
https://gist.github.com/LokiFawkes
91.
https://gist.github.com/LokiFawkes
92.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4422110#gistcomment-4422110
93.
https://github.com/aptblog
94.
https://gist.github.com/arkbg1
95.
https://gist.github.com/arkbg1
96.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4422682#gistcomment-4422682
97.
https://github.com/LokiFawkes
98.
https://github.com/aptblog
99.
https://github.com/joepie91
100.
https://github.com/joepie91
101.
https://gist.github.com/aptblog
102.
https://gist.github.com/aptblog
103.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4423294#gistcomment-4423294
104.
https://theconversation.com/is-social-media-the-weak-link-in-the-fight-against-cyber-attacks-36211
105.
https://gist.github.com/LokiFawkes
106.
https://gist.github.com/LokiFawkes
107.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4423815#gistcomment-4423815
108.
https://github.com/aptblog
109.
https://gist.github.com/aptblog
110.
https://gist.github.com/aptblog
111.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4424792#gistcomment-4424792
112.
https://github.com/LokiFawkes
113.
https://healthylivinguru.com/why-is-too-much-workout-bad-for-you/
114.
https://gist.github.com/LokiFawkes
115.
https://gist.github.com/LokiFawkes
116.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4425042#gistcomment-4425042
117.
https://github.com/aptblog
118.
https://gist.github.com/MandiYang
119.
https://gist.github.com/MandiYang
120.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4430239#gistcomment-4430239
121.
https://protonvpn.com/blog/is-protonvpn-trustworthy/
122.
https://gist.github.com/arkbg1
123.
https://gist.github.com/arkbg1
124.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4430317#gistcomment-4430317
125.
https://protonvpn.com/blog/is-protonvpn-trustworthy/
126.
https://gist.github.com/carmellopezhere
127.
https://gist.github.com/carmellopezhere
128.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4495137#gistcomment-4495137
129.
https://gist.github.com/joepie91/www.streamvpn.com
130.
https://gist.github.com/GASOLINE
131.
https://gist.github.com/GASOLINE
132.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4495302#gistcomment-4495302
133.
https://gist.github.com/joepie91/www.streamvpn.com
134.
https://gist.github.com/Kyr4l
135.
https://gist.github.com/Kyr4l
136.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4496567#gistcomment-4496567
137.
https://gist.github.com/joepie91/www.streamvpn.com
138.
https://gist.github.com/ElTioRata
139.
https://gist.github.com/ElTioRata
140.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4506928#gistcomment-4506928
141.
https://gist.github.com/LokiFawkes
142.
https://gist.github.com/LokiFawkes
143.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4507328#gistcomment-4507328
144.
https://gist.github.com/CostcoFanboy
145.
https://gist.github.com/CostcoFanboy
146.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4517815#gistcomment-4517815
147.
https://gist.github.com/Moizsohail
148.
https://gist.github.com/Moizsohail
149.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4524658#gistcomment-4524658
150.
https://www.freeopenvpn.org/index.php?lang=en
151.
https://gist.github.com/isaackielma
152.
https://gist.github.com/isaackielma
153.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4557732#gistcomment-4557732
154.
https://github.com/ranazain0009
155.
https://gist.github.com/aedicted
156.
https://gist.github.com/aedicted
157.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4557745#gistcomment-4557745
158.
https://gist.github.com/Viral
159.
https://gist.github.com/Viral
160.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29?permalink_comment_id=4577535#gistcomment-4577535
161.
https://gist.github.com/join?source=comment-gist
162.
https://gist.github.com/login?return_to=
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
163.
https://docs.github.com/site-policy/github-terms/github-terms-of-service
164.
https://docs.github.com/site-policy/privacy-policies/github-privacy-statement
165.
https://github.com/security
166.
https://www.githubstatus.com/
167.
https://docs.github.com/
168.
https://support.github.com/?tags=dotcom-footer
169.
https://github.com/pricing
170.
https://docs.github.com/
171.
https://services.github.com/
172.
https://github.blog/
173.
https://github.com/about
174.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
175.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
Hidden links:
177.
https://gist.github.com/
178.
https://gist.github.com/
179.
https://docs.github.com/articles/which-remote-url-should-i-use
180.
https://desktop.github.com/
181.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#dont-use-vpn-services
182.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#why-not
183.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#but-my-provider-doesnt-log
184.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#but-a-provider-would-lose-business-if-they-did-that
185.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#but-i-pay-anonymously-using-bitcoinpaysafecardcashdrugs
186.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#but-i-want-more-security
187.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#but-i-want-more-privacy
188.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#but-i-want-more-encryption
189.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#but-i-want-to-confuse-trackers-by-sharing-an-ip-address
190.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#so-when-should-i-use-a-vpn
191.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#so-then-what
192.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#but-how-is-that-any-better-than-a-vpn-service
193.
https://gist.github.com/joepie91/5a9909939e6ce7d09e29#so-why-do-vpn-services-exist-surely-they-must-serve-some-purpose
194.
https://github.com/