VPN is more dangerous than no VPN

>VPN is more dangerous than no VPN
Is this actually true? I'm not trying to hide from the CIA, I just want to know if this makes it easier for my ISP to see what I'm downloading.

Attached: EBniu4mW4AIyB2D.jpg (640x480, 21K)

Other urls found in this thread:

thehackernews.com/2017/10/no-logs-vpn-service-security_8.html?m=1
twitter.com/SFWRedditVideos

ISPs don't profit much from digging into every single user's encrypted traffic.
If however, a three-letter agency decides to look into you, VPNs won't help much.
Even with a VPN though, user stupidity is the main reason for one being discovered. A lot of JS can see what your IP is if you let that js run.

ISPs will in all likelihood not try to decrypt your traffic, that would be an enormous amount of waste of their time.

But if the FBI/CIA wants to get your data, they will no matter what you do.

7 proxies are necessary when communicating on the dark web. Don't use a darkweb connection for anything other than communicating with your friends.

Don't fucking get a VPN to watch porn or youtube videos you fucking losers.

Encryption is the last thing to attack provided it isn't shittily implemented.

>JS leaks IP address
Proof? Or are you conflating WebRTC and JS for no clear reason?

The key is to hide in plain sight. If someone suspects you are trying to hide something they will place close attention to you.

Do they really care though? And how are they able to spy on you like that?

I bought a 3 year plan on NordVPN, I can always request a refund while in the 30 day period
I talked to a customer support pajeet and he requested me a ticket, this is what it said


>In other words, none of your private and secure data is logged and gathered at any time.

>As a result, we are not able to provide any details about your behavior online, even if you (or the police) requested it.

>In other words, you are correct by saying that the only way to someone to be reported to the proper authorities or get his/hers account terminated is by someone contacting NordVPN with a specific account and evidence.

Pretty decent speeds too
I dunno, even though it's shilled everywhere it ain't that bad and they live up to their promises

I run uwantmy.info a small VPN company.

I agree with basically everything said.
Your ip leaks, dns leaks are client side errors. Companies like nord are required to keep data on their customers, by law. With us, it's user log in times, and that's more for debugging on our end.
if you're the target of state funded spying, you're cooked.

We offer cert signing to increase security and privacy. However, we're not really open to the public.

B

Look up Operation Pacifier. They added some JS to a cp site and it ended up busting a bunch of guys but that was mainly because of an outdated tor browser bundle or JS not completely disabled.

Nord will drop your speed right after the 30 day return period like everyone else. Be ready

Sorry, to continue on and answer your original question.
a VPN is a lot better than nothing. It makes mitm attacks a lot harder, can get you around country blocks, stops your isp from snooping, adds another layer of distance from you and the internet.
However, client dangers like drive by sites, exploits, malware, etc. The typical user stuff.

B

Problem is when you access illegal material and the CIA is monitoring all network traffic to that material, they'll immediately see your IP. VPN at least hides that. If they already know they want you, nothing is going to stop them from decrypting your connection.

The bigger question is why are you accessing outright illegal material?
There isn't a whole lot you can be busted for and if you have peaked the CIA interest you must be trying to subvert the government

what are you trying to accomplish? if it's government censorship then it might be worth a shot. i would also use vpn if i were using public wifi. other than that there's no point in using it since you can get all the illegal stuff on onion web and it's pretty secure.

I find onion kinda slow. With a VPN it's considerably faster, and can be just as easy.
our openvpn is a aes-256-gcm connection. With a 4096bit dh handshake. I believe it to be secure from any isp. However, if the state is after you, I think you're toast.

Good thing I run NoScript while browsing with my VPN

isp couldn't care less what you're doing unless you're a terrorist or something so i don't see a point in using it. well, i guess it depends on the isp but mine is just over the street and i know those guys personally. that's why i only use vpn to my server at home when i'm away.

A lot of isp in the USA monitor torrents and follow up on dmca reports. Using a VPN prevents that. Just be sure the VPN has no ties to the US, or they to need to follow US law.

B

>VPN is usa/israel/echelon based
v&

>A lot of isp in the USA monitor torrents and follow up on dmca reports
ah, well if you're from states that's a different story. i'm a yuropoor and nobody here cares as there are there are actual problems to address.

Attached: Screenshot_2018-09-08-12-17-32_proc.jpg (1080x1340, 118K)

Agreed. I tend to buy servers in France, Netherlands, Sweden, and Russia. Far from the reaches of the USA.

It tunnels your traffic through a third party.

The ISPs themselves don’t monitor torrents, they only respond to reports
People here can torrent for years without problems
The copyright holders often hire 3rd party firms to monitor the IPs of the infringing torrents and then reports get sent to the ISP
ISPs don’t do shit unless there legally obligated to

Checked!
To expand on that, Comcast injects 'stuff' into some browsers. Which is shady for monitoring users. As for torrents, I know they respond to dmca threats. However, I don't know what they are truly monitoring, you're right.
B

You have no way of knowing they don't keep logs.
Also, they are shilled everywhere and buy reviews. They're known for slowing your shit down soon as that trial is up.

>if you have peaked the CIA interest you must be trying to subvert the government
You say that like it's a bad thing.

If you add one more B to your posts I'll have to report you for signature use.

Attached: image0mh.jpg (640x696, 74K)

Still getting browser fingerprinted unless you are using tor browser

ISPs give zero fucks about what you're doing and on any secure connection can't see shit beyond the domain. As pointed out if three letter agencies want you you were fucked way before they decrypted any traffic

I have my own vpn setup using ec2

my IP shows up with amazon as my ISP, kek. hope jeff doesn't leak my data...........

Routing through a non-5 eyes country is a stupid idea if you are worried about alphabets.

No one will pay for a vpn if they know they sell their users out. I imagine vpns work very hard to protect the image that they would never sell you out. Denying the law data and gettinf away with it is basically free advertising for them

Notice this was for CP sites, unless they have reason to believe you are breaking the law, the feds won't really have a reason to go after anyone in particular. At least, as far as I know. But a VPN and NoScript is good in general I suppose

Attached: image-20151210-7447-1jxt9s0.jpg (960x720, 37K)

LOLNO. Try illegal streaming while staying in a hotel in, let’s say, Deutschland. No less than 300€ ticket from hotel isp.

False. NoScript blocks fingerprinting. EFF am I unique site says my fingerprint is not unique.

explain

Based

Attached: 1542172522491.jpg (1405x1440, 576K)

>yes, yes, you must FEAR the UNLIMITED OMNIPOTENT POWER of the intelligence agencies

Attached: 1563806674505.png (480x466, 139K)

I'm so fucking sick of this unique fingerprint meme shit...
You WANT a unique fingerprint.
Let me clarify that.
You want a MUTABLE unique fingerprint.
Install ungoogled-chromium, go to chrome://flags, and set these flags to enabled:
#fingerprinting-client-rects-noise
#fingerprinting-canvas-measuretext-noise
#fingerprinting-canvas-image-data-noise
Boom.
Different unique fingerprint every time a page loads or refreshes.
Geez.

wow this is neat thx

Nord are required to keep logs of activity or data pertaining to who purchased the subscription?

No, it's just CIAniggers glowinthedarks that want you to be an easier target

Realize that with a VPN, proxy, and/or onion, your content is being routed through middlemen who could possibly decrypt and snoop on your content. Those services hide your location at the end point but possibly compromises your data. Browsing without a VPN and whatnot reduces a MITM intervention but exposes your location.

>and if you have peaked the CIA interest you must be trying to subvert the government
Or you're within two steps of someone who is (ie family connected, or family connected to someone who is family connected)

this kid got too cocky

Attached: 1565141413219.jpg (1078x1069, 74K)

>Don't fucking get a VPN to watch porn or youtube videos you fucking losers.
Why? I don't want personalized shit on pornhub

JUST. USE. TOR.

It will hide what your ISP thinks you're doing yes because they're not the ones with the tools to monitor your shit. In order to do so they'd have to be the site you're fucking connecting to in the first place.

>hur durr use TOR
doesn't really offer anything over PIA honestly

based shinyposter

It's free
It's more secure
There's no VPS logs
It doesn't glow
Can access .onion sites

Using a VPN ran by a dude that's a bitcoin scammer/thief who has no care in the world about his customers. What could go wrong?

It's not secure enough to stop the government from spying on you if they feel like and PIA is already secure enough to avoid anyone else so what's your fucking point
yeah dude t-totally hasn't been proven in court that they're not s-spying you or anything b-baka

It's absolutely secure enough to stop the government spying on you provided you don't use exit nodes, and even if you do they can't decrypt https.

There has never been a bust on TOR that has been due to a fundamental system floor, only boomers downloading pizza.mp4.exe, running Javascript, and regards like DPR doxing themselves.

Meanwhile VPN users, even logless ones, get arrested by the glows all the time.

thehackernews.com/2017/10/no-logs-vpn-service-security_8.html?m=1

If you care about security use TOR

I really don't trust PIA. It's almost uncomfortably fast, it's ridiculously cheap for a paid VPN, and I have trouble believing any VPN that says they keep absolutely no logs.

If they don't keep logs, how do they limit the number of VPN connections from different devices? What about handling DNS requests? They might rely on a 3rd party DNS provider that logs DNS requests. Also, how do they prevent abuse, such as spammers, port scanners and DDOS attacks?

In addition, their parent company is super-sketchy and they're located in the US (which is an immediate red flag for me). It's also worth mentioning that PIA is at the top of seemingly every single VPN list on the internet, and I recall reading somewhere that they pay TF to stay at the top of their list.

Depends on who you're trying to hide your history from.

use VPN's to torrent, nothing else. and even then you don't really need a VPN, just a proxy (your IP will still show as something else than your real one in the swarm). proxy's are also faster than VPN's in terms of download speed.

MUFs only work if everyone uses them.

I don't see how recommendations make your PH experience worse.. unless you can't come to terms with what you like (which is gay).

Attached: 1557245225124.png (866x635, 236K)

>funded by the government
nice try glowie

You are stupid, noone actually monitors hotel wifi. You can watch iptv if it works as much as you like. Isp is not interested in you breaking the law. Maybe in ameributt...

Well german police does

>There are people in this thread that think they matter to their ISP out of thoughts of users
>There are people in this thread that think matter to their government out of millions of users.

Attached: VPNsAreForPedos1.jpg (317x267, 12K)

>out of thoughts of users
Out of thousands of users

Well, it's time for me to sleep Anons. Good night.

noscript literally break the internet though. Can't even watch youtube right or news sides. Does it need some configurations?

It's almost like data harvesting can be done in an automated, broad untargeted manner.

Do you have autism user? Your data isn't worth that much. Must be scary you have to post on here without a VPN.

I like how your ISP is evil and is spying on you but the random 3rd party VPN operator isn't spying on you and looking through your data.

How do I make VPN of my own?
I'm buying pi4 and I wanted to know how to encrypt my data and DNS.

you dont need a v p n for downloading
you need block lists, encryption and no pex dht etc

How do you figure that?

ungoogled chromium is a chinese botnet. get regular chromium and degoogle it yourself. also, you're completely wrong about the fingerprint, you want to blend in with as many other browsers as possible. having a unique fingerprint every single time will make you stand out even more since the page clicks can be correlated to the same IP

It's not nice to laugh at people with special needs user

Use a tripcode.

it's the same company that doxed and exposed all the le haxor anons in the 2010 era after saying they don't have logs. Did everyone forget about that?

Attached: 1556011957554.jpg (680x638, 59K)

wat
you would be encrypting it in your lan for no reason. you need a vps to set up your own vpn

how is it a chinese botnet, it's not contacting any extra ips

>How do I make VPN of my own?
A VPN with one user, that totally sounds private!

germans are good goys. rest don't care.

>Watching 3DPD porn

Attached: 1563869318280.png (726x550, 351K)

>3rd party VPN
host your own

reminder that almost all VPNs rent servers from data centers, who are absolutely logging connections. doesn't matter what the VPN does, the data center is logging

Mullvad, Jow Forums's sweetheart, has literally admitted this and recommended the only way to avoid the issue is to multihop

>If they already know they want you, nothing is going to stop them from decrypting your connection.
AES is still unbreakable for even three letter agencies.
Of course, if they have contacts at your VPN provider, all bets are off.

>Mullvad, Jow Forums's sweetheart, has literally admitted this and recommended the only way to avoid the issue is to multihop
citation needed

There's no way to get around that, every provider has its own provider that is also logging incoming and outgoing IPs, plus glowies recording everything

something like 80% of VPN companies are owned by the same 5 companies and at least half and maybe more of those are glow owned or infiltrated

Well clearly they have to be infiltrated. AES still can't be beaten :^)

then there's no point in whining about VPN logs

the only mitigating factor is that data centers run on razor-thin margins and don't want to log anything they don't have to, so those logs won't be there for long

piqued*

>ISPs don't profit much from digging into every single user's encrypted traffic.
Thats where you're wrong kiddos

>VPN is more dangerous than no VPN
Instead of only using say 2 companies to pipe your data through you decide to use 3 or 4 companies to pipe your data through. Do you think that your data is more secure with the added companies handling it? No, it won't be more secure. The more your data is handled the more of a chance it will get leaked in any number of ways. If you want to be a victim of identity theft then the best coarse of action is to spread your data through as many companies and services as you can. You don't want that to happen? Then keep your data reduced to as few hands as possible. The best solution is not using the internet.

Attached: 1458940770332.gif (355x200, 3.65M)

>muh CIA
>muh FBI
>muh US government
>If however, a three-letter agency decides to look into you, VPNs won't help much.
>But if the FBI/CIA wants to get your data, they will no matter what you do.
This thread is so full of underage faggots i can't handle it, i'm out.

and that's why you use a VPN that uses ONLY well vetted data centers. Of course there's a chance the DC may log but looking at their past can really indicate if they are honest or not. VPN's like AirVPN,Mullvad,and Cryptostorm do this type of thing unlike others that just find a location and rent a server with no real background check. Multihop is the safest solution for sure especially two different VPNs

Bro that was just phone app "VPNs" that are really just proxies to data mine.

This is correct. PIA has a shady past everywhere but people keep stick with "muh court tested"

>everyone in this thread

Attached: 771_3584442552838486.jpg (530x640, 41K)

both of these are true

like it or not retard, these organizations have more resources than you and i and if they really want you they will get you

>VPNs won't work against glowniggers
>How? Just trust me dude
fucking alphabet faggot, i should have your job. you guys make it so obvious

Attached: 1541625884104.jpg (1024x428, 36K)

Here's a hint: "single point of failure".

it all depends on your ISP. They are, after all, the PROVIDERS of your connection. If you think that some outbound connection going through their devices first is going to stop them from looking at the data stream, you're a fucking retard.

>I don't know how TLS works

Attached: 1565527338392.png (1006x5452, 623K)