Replying to Avatar Foundation

Join us @ 2PM EDT for the latest Journey to Sovereignty 🎙️

Today we'll be getting into a topic we touched on last episode as a powerful tool to protect yourself - VPNs.

We'll talk what they are, how they work, and why you should be using one!

https://twitter.com/i/spaces/1ZkKzXVmkzZJv?s=20

VPNs often get a bad rap from a few of the malicious companies in that space with too large of a marketing budget, but they are immensely useful as a way to protect your internet activity from prying eyes. VPNs let you take back control of your online data.

As always we'll also upload this episode to our podcast feed later today, but we'd love to see many of you join live and get all of your questions answered on the topic of VPNs or internet privacy!

https://journeytosovereignty.alitu.com/1?order=newest

After tons of research and conversations with experts in the field of privacy I'm an "always on" VPN user.

Excited to break down why later today, and would love to answer your questions on the topic alongside #[1]

Don't miss it!

P.S. we'll be covering Tor next episode, so don't feel like we're ignoring the benefits it brings!

#[0]

Reply to this note

Please Login to reply.

Discussion

Seth, do you mind if I broadcast the Space over onto NostrNests.com ?

Of course not, that would be fantastic!

I'm also all ears on the best way to do so while running Twitter Spaces, happy to take that over once I figure out a good setup.

VPN+TOR+DNS resolver are good first steps to privacy. Keep up the good work!

💯

I gotta take my vpn off to connect to my databases which only allow my personal IP through the firewall.

Otherwise, always on. 🤝

I still need to figure out how to have VPN and tor running at the same time but for different applications.

If you are using android then the "Invizible Pro" app by Oleksandr Garmatin has Tor+VPN+DNSCRYPT+Firewall in it. It's FOSS so you can get it on FDroid or Github.

It allows per app, website, domain filtering with whitelist or blacklist functionality. You can modify what countries the Tor tunnel will route through and what start and end points to use if you want to avoid any of the 14 eyes countries or known data harvesters.

Good to know! I run into this on desktop too though.

I'm not sure if there is anything easy to use with that functionality on desktop.

Running an RPI with PiVPN (or Tailscale, Wireguard, Nebula, etc) and use Adguard Home (or Pihole) to run a recursive DNS resolver. I'm unsure about running through TOR after that unfortunately.

If you use Linux, Unraid or Docker you can do a lot of that without an RPI.

On Android (Calyxos at least) you can set up two profiles on the same phone. On one you can run Tor / Orbot. On the other an always on VPN.

I'm looking to do this on the same profile. This reply seems promising though: https://damus.io/note1mn3s4er82aj7xlf5mxdj5t0f8qtttyjw95gj6tg0vqdlamrkxzysje6qkr