Avatar
BigFish
34ca937f6e91550633ff4d8381b388b0cca22d212ff8e7b953f0f458cb16e915
Economics & Risk Mgmt background. In it for the future I want to live in. --> Relay: https://nostr.hifish.org

Helping nostr grow, improve resiliance.

No specific benefit for me other than learning about linux and docker ๐Ÿ˜Š

Great morning to you ๐ŸŒžโ˜•

VPN Mistakes to Avoid

VPNs are a great tool for privacy, but they are often misunderstood and misused. Sometimes people believe that they are getting more privacy or anonymity than they actually are. Or other times, a userโ€™s goals are possible, but were not executed correctly.

Who sees traffic?

First of all, there are many different participants who can view different types of information about what youโ€™re doing online. These include, but are not limited to:

1) Your Internet Service Provider (ISP)

2) The website itself

3) The government

4) Microsoft or Apple (unless youโ€™re on Linux)

5) Google if itโ€™s an Android phone or youโ€™re using Chrome Browser

6) Search engines

7) Cross Site Cookies such as Facebook, Google, Twitter, Amazon, and more which can track you even on a different website.

8) Your router manufacturer, unless you specifically put open source firmware on it

9) Database brokers, such as Oracle, which get contracted to fingerprint your device by some websites and services and then resell that data to advertisers

10) Browser Add-ons may report data back

11) Your DNS or Domain Name Service. Often your ISP will pass this off to Cloudflare or Google

12) Many Websites use Denial of Service (DoS) from Cloudflare and Captchas from Google. These can be sources of tracking.

13) Companies such as Silverpush use ultrasonic audio sounds, which are invisible to the human ear, that are emitted from your computer desktop speakers and picked up on your smart phone, to track you across devices.

So now letโ€™s talk about what a VPN does and does not hide (and what other techniques can be used to help).

______________

VPN Basics

A VPN forms an encrypted tunnel between you and the VPN company. Then whatever you do, is executed from the IP address of the VPN company.

A VPN does hide the following:

1) Your IP address from the website

2) Your traffic from the ISP

3) If properly configured, the VPN should have their own DNS, which will also hide your traffic from the DNS provider that the ISP uses, such as Cloudflare

______________

A VPN does NOT hide the following:

1) The Operating Systemโ€™s company (e.g., Microsoft, Apple, or Google) phones from knowing the traffic and your true location (IP address)

2) Any type of cross site cookie tracking, such as Facebook

3) Any type of browser fingerprinting from the website or from its third party database broker, such as Oracle. Fingerprinting data include your timezone, your screen dimensions, and operating system version.

4) The government forcing a VPN company to track you in real time

How to Mitigate these issues

Now the cookies issue can be solved by properly modifying your browser settings (and using a good browser).

We covered this in this article.

The browser fingerprinting issue can be solved by Virtual Machines, which we covered in this article.

The Operating system issue can be solved by using Linux or degoogled phones. We covered how Linux works in this article. But if you are insistent on using Microsoft Windows or Apple, then a VPN on the router (instead of the computer itself), could help in some ways, such as hiding your real location.

______________

VPN on a Router

Putting a VPN on a router (instead of the computer itself) hides your IP address (and thus your real location) from Microsoft/Apple. But they can still see the traffic.

Now in theory if you never sign in to any account associated with your real name or known nicknames on that device, then it could potentially hide your identity. But in practice, this is highly prone to mistakes in execution, and itโ€™s far better to just use Linux, using Windows or Apple only for specific software you need Windows or Apple for.

Also putting a VPN on most retail routers will slow down the internet connection, since the processing power on a router is less than real PC CPUs. However, there are more expensive ($500+) firewall routers that can match a computerโ€™s speed because they have real CPU chips inside.

No Logs?

Now letโ€™s talk about logs. Most VPN companies advertise a no logs policy.

This may or may not be true in practice. One can evaluate how the logs policy compares to their other policies.

For example does the company accept cryptocurrency? If the traffic data is tied to your real world financial identity, then the company is clearly less committed to keeping you anonymous.

Also, free VPNs that donโ€™t cost anything to use should be avoided. They have no profit motive to protect you and usually store and sell data. Why else would they want you to use the service for free?

Not only should you only go with VPN providers who accept cryptocurrency, but also make sure they allow sign-ups through Tor. Do they process payments themselves or use a third party like Coinbase which blocks Tor?

Even though you may not use Tor to connect to the VPN, you want to see that they allow customers to actually be anonymous while in compliance with their legal department. This makes it much more likely that their legal structure is set up to resist third party attempts to de-anonymoize users because if the customer used Tor and cryptocurrency, then they canโ€™t identify you.

What is the legal history of this VPN company? All of these factors can help you evaluate if you should believe their logging policy.

I hope you learned something, Subscribe on Nostr for more content!

Great article, insightful ๐Ÿ‘. Thanks. Was not aware of all the aspects, although I'm using linux.

Replying to Avatar Lyn Alden

As developed nations continue to enter sovereign debt crises akin to the 1940s, there are a few main outcomes.

Option 1) In a world without bitcoin, or if bitcoin fails, central banks and their governments recapitalize themselves with gold, devalue the people, and do another cycle of this inflationary policy for the next few generations. The Treasury/Fed handbook literally has a written option for this, although it is stated more opaquely. It can be done in the US (and probably many other countries) based on current laws if shit hits the fan. Denmark's central bank and China's economic ministers have also written similar things regarding extreme outcomes. It's pretty straightforward based on the past.

Option 2) We go into a centralized technocratic future. Centralized AI and CBDCs win. People have cuck money that the AI+government control. It's like Brave New World, 1984, take your pick. Hard to say, but not free.

Option 3) Open source money wins. Bitcoin and its ecosystem win. Governments get defunded from their fiat printers, and have to be more honest with their ledgers or default and get reconstructed since they can't print what their people hold as savings, or in the hegemon's case, can't print what the world holds. Probably a world of chaos for a time during the transition, but also an opportunity for peace and building the next era. Keeping track of the nukes would probably be a big deal, like when the Soviet Union fell. It's actually kind of remarkable that they collapsed economically and politically but in an orderly enough way to keep track of and secure most of the nukes.

I don't know which one will win, but I consider Option 3 to be the honorable method; the path of transparency. That's the one I am rooting for and building for.

If I fail, I would like it written that it's the method I tried for, but realistically the AI+government will probably delete most of the records of all of the failures anyway, since that is how history works, without any sort of objective truth keeper. Our best hope is to hide records in a distributed way and hope they can remain undisturbed for a while. At least bitcoiners have a tendency to write stuff in steel and make low time preference things. Some psychopath will hopefully carve a life work in steel in a cave or something, but who knows, lol.

And ironically, if Option 3 wins, any of the losing factions could still insert their ideas and paths into the Bitcoin blockchain, now or in the future. It's the most immutable database that we know how to build, and would preserve their ideas as it does our ideas. Like, you know what? I *want* the Communist Manifesto to be in the immutable Bitcoin blockchain, because I want people in the future to know how *bad* it is. It might already be in there; I don't know. I wouldn't want people centuries from now to think about those ideas and believe they came up with something new; I want to preserve my enemies' texts because I believe I can win through markets, force, virtue, and truth.

I think that's almost always what determines the winning side. Losers want to burn their enemies' texts to ensure that their good ideas don't spread too much. Winners want to preserve their enemies' texts to ensure that their bad ideas are never repeated.

Great assessment Lyn ๐Ÿ‘

Suppose that AI might help to prolong the current state as it could allow for management of the complex world by centralised entities (govt, CB, WHO etc.)

One could argue that this complexity led to "failure" of central planning in the past. There was not enough central human intelligence to plan society/economy.

Todays central planners might think/hope that AI solves this limitation and a communist, one world government utopia is possible.

#plebchain

True.. ๐Ÿ˜ฌโ˜น๏ธ

Replying to Avatar Cyph3rp9nk

๐Ÿคฃ..

๐Ÿ˜‹๐Ÿ˜‹๐Ÿ‘. Enjoy

Delicious ๐Ÿ˜‹๐Ÿ˜‹ enjoy

Replying to Avatar Cyph3rp9nk

Unfortunately true... ๐Ÿ˜ค

๐Ÿ˜„๐Ÿคฆโ€โ™‚๏ธ..