All VPNs report data to government, when they don't actively sell it to them as part of the business model. I dealt for years with medical data and the first rule was to never use an off the shelf VPN... ever. When you use a VPN, you are just choosing who can track you. You can make your own VPN, but single users don't get any annonimity from it. You have to have multiple people using it and they can still track the group together.

You will always have your name attached to the ISP. You can choose a proxy, but they will track the proxy too. And the proxy better not have worse security than you. By just tracking your over time, they can farily estimate which devices you use.

People tend to significantly underestimate how much leaks when somebody is tracking your for a long period of time. Especially when your credit card and phone are always together.

Reply to this note

Please Login to reply.

Discussion

Some VPNs accept lightning. Use those. Same for esims.

use cash to buy a visa gift card buy VPN?

Exactly.

Personally I think the big push for people to download VPNs in UK was a psyop.

VPNs have always sold our data to governments and advertisers.

There's like 1 that is actually known to be safe and another 2 that maybe safe but are kinda sus

Everything else is just harvesting your data to sell, paid and free VPNs, almost none of them are safe

A good VPN has no usable data to give the government upon subpoena.

Your name need not be attached to the ISP. No proxy is needed (although even a proxy significantly breaks the chain). There is no way to determine which devices you use if there is no identity tied to the devices. And you still have device spoofing if you wanted.

It has to follow the Free Software ethos (Proton, IVPN, and Mullvad come to mind), and do it well. I know nostr:nprofile1qy2hwumn8ghj7ct4w35zumn0wd68yvfwvdhk6qg0waehxw309ahxjup3xuhxxmmdqqsdngef474mycag4usksw8tghslqnxrqqrsg3jfglztjplphm6cp4c7auuy5 and myself had done this in the past, though he's done it for at least 8 years, if not 9 at this point.

Correct.

In the US, the ISP privacy policies say "we will collect and share everything" and US policy says "we can subvert any ISP at any time with an NSL" so it is unlikely that using a VPN over the ISP can be worse than using your ISP without one. To your point, there are better and worse VPN services. If your VPN asks for your name, address, and phone number, for example, that's a red flag. Of course they're going to see your IP addresses and DNS requests, but again, it can't be worse than your ISP. Tor can help with that. If TLS isn't broken, then neither the VPN nor the ISP can see the contents of what you send to what site.

I agree if the gov'ts want to "get" someone, they can and will. But we shouldn't make it so easy.

mix VPN + tor + no-contract sim + cash-bought laptop = lower herd immunity, but yeah,state-level eventually cracks anyone who stays interesting long enough.

so maybe just rotate identities before they get curious?

What we need is a little corner on Nostr that remains impenetrable to surveillance, irrespective of the adversary. This is crucial to summon the next Satoshis.

imho that corner already exists , it’s called NIP-17 giftwraps. vector’s DM layer, powered by OpenMLS + marmot, ships whole convos wrapped in nested onion-like seals. traffic looks like random bloom filters over daisy-chained relays.

you still gotta mind your tor/isp hop up-front, but once inside the giftwrap tunnel even the relay can’t peel the layers. great spot to hatch new sats without leaking who’s talking.