/g/ - Technology

Computers, Software, Technology

Posting Mode: Reply Return

Max message length: 5000


(used to delete files and postings)


  • Supported file types: GIF, JPG, PNG, WebM, OGG, and more
  • Max files: 5
  • Max file size: 50.00 MB
  • Read the global rules before you post, as well as the board rules found in the sticky.

11/30/20 Our server migration on 11/29/20 was successful!
08/28/20 Come and join our Matrix/IRC servers, the info can be found here.
02/09/20 /ausneets/ has been added!
11/23/19 Donations can now be made via PayPal, thank you for all of your support!
11/21/19 We have successfully migrated to LynxChan 2.3.0, to see all of the changes to 16chan, click here.

[Index] [Catalog] [Archive] [Bottom] [Refresh]

(47.94 KB 728x380 nordvpn.png)
VPN = data collection scam? VPN = data collection scam? 10/09/2019 (Wed) 22:05:01 ID:b7fc19 No. 983
Why would you trust a large VPN like Nord or Express to not just sell your info? Their clients info most likely worth more than granny on facebook. Why wouldnt NSA start a VPN service and price it extremely competatively?
>>1064 No logs is what matters, and to be honest, no country is safe my friend. I know the hacktivists that run AirVPN they are extremely anti-government and pro-privacy. You don't have to take my word for it but they will tell the authorities to fuck themselves.
>>1084 If you're using the burner phone's internet somewhere other than your home, having only put the battery in when you need it, and while not having any other phone then you don't need to sign in to google over tor. But if you want to sit at home and use google stuff then you can't use the burner phone in your home without creating a log of your whereabouts at the time. What you do can be traced to you if you do it at home on a burner phone. So to enable sitting at home comfortably while not being knowable via logs you'd want the burner phone. Twitter is an example. If I want to say something it's a spur of the moment thing. I am not going to break out the burner phone and go on a mission to post some opinion on twitter/google. I want to be able to do that just whenever I think of it. That's the only way 'it' would even happen at all. It's to not be chilled. It's to be able to do anything a normie could comfortably from home while still anonymous.
>>1087 >having only put the battery in when you need it Well, I hope the phone being off is sufficient, most phones don't have a removable battery anymore. AFAIK, there isn't any provision for phoning home in the android code base (I have worked on it), something like that would have to be entirely implemented in hardware, I would be very surprised if something like that were in there. >But if you want to sit at home and use google stuff then you can't use the burner phone in your home without creating a log of your whereabouts at the time. What you do can be traced to you if you do it at home on a burner phone. You can't use your burner phone at home at all, because the mobile phone company keeps logs on where you are. Google would use the GPS or wifi info, mobile phone company would use the information from the tower your phone connects to and has a pretty good idea where you are at from triangulation. If you want to live dangerously, you can use airplane mode, but I wouldn't trust myself not to fat finger it and turn airplane mode off.
>>1068 >>1069 >>1075 I just wanted to report back in that I finished my setup as described in my previous post with a few modifications: 1. I am using Wireguard based on anon's recommendation, and I highly recommend it! It's a breeze to set up on OpenBSD. and I'm running my server in a good VPS I picked from the link I will share below. It's only $5/month and I have full control over ISO mounting, upgrades, reboots, etc. My Wireguard client runs on a local firewalled Beaglebone Black which routes all my home/office traffic through it. In addition, have a DD-WRT router has a 5 port Ethernet switch which I use that as a second firewall/router. 2. I'm using Unbound as a caching-resolving DNS server on the VPS which is only listening on the private VPN tun interface for use by all of my internal nodes. This prevents any DNS leaking. 3. I set up a Tor Bridge that also only accepts connections from the VPN interface and subsequently relays my Tor clients through the established Tor circuit. Here are some resources that I used to get it all working: Wireguard on OpenBSD: >https://blog.jasper.la/wireguard-on-openbsd.html >https://www.findelabs.com/post/wireguard-on-openbsd/ PF >https://github.com/findelabs/openbsd-ansible-deploy/blob/master/roles/wireguard-pf/templates/pf.conf >https://daemon-notes.com/articles/network/pf Unbound: >https://www.ckn.io/blog/2017/11/14/wireguard-vpn-typical-setup/ ^ Follow step 7 and configure Unbound in OpenBSD as described >https://www.tumfatig.net/20190405/blocking-ads-using-unbound8-on-openbsd/ Tor Bridge: > https://community.torproject.org/relay/setup/bridge/openbsd/ Set your "ORport" and "ServerTransportListenAddr" to your tun0 IP Snort: >https://functionallyparanoid.com/2019/03/18/installing-snort-on-openbsd-6-4/ >https://jumpnowtek.com/security/Running-a-Snort-IDS-on-OpenBSD.html List of Tor friendly/unfirendly VPSs: >https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs Hope this helps someone. Remember lads, with any VPN-as-a-service provider you are putting 100% of your trust in them with all of your DNS queries and internet traffic. You have never met these people and really have no clue who they are. Be smart, buy a VPS with crypto or a PP credit card and run your own shit privately! It's not that hard, it's fun to set up, and it gives you ultimate control and privacy. Check your DNS leaks via: http://dnsleak.com/
>>1083 Why disable IPv6?
>>1076 >I really want to buy bitcoin anonymously, but it's really fucking hard. I wouldn't use a bitcoin ATM tbh. They all seem to want ID over a certain amount. Plus with SMS verification and the fact that they're all located in places that guarantee you'll be recorded and photographed I say screw that. Not to mention the ass rape fees they charge. Try Paxful and/or local bitcoin meetup where you can do an in-person cash purchase away from Skynet. True, there's always a camera somewhere watching but at least it's not a timestamped association with a bitcoin transaction. Just my $.02 and it's how I plan on going about it.
>>1091 Agree 100% >Paxful >Local bitcoins Local Bitcoins stopped offering local transactions. Paxful also required id IIRC. eBay and Craigslist seem to be the places to go. Or pop into your local head shop and enquire. Still going to use a burner phone though.
>>1092 Where are you finding btc on eBay, all I saw was miners and hw wallets for sale. Plus 99% of eBay sellers require Paypal. CL seems sketchy but nevertheless a search in the closest major city turned up nothing for me. Not all Paxful sellers required ID when I checked earlier, wallofcoins looks promising, and there's also a bunch of local meet ups on meetup.com
>>1090 To lower your attack surface. It adds no value whatsoever.
>>1094 >no value whatsoever. Well winfags will notice MS makes a lot of use of it, has value to ((gates))
(11.11 KB 279x225 BigBennyB0y.png)
>>fags in thread >I use VPN to Tor https://matt.traudt.xyz/posts/vpn-tor-not-mRikAa4h.html Keep in mind that End-to-End traffic correlation is still the weak point in low latency onion circuit. Are you to trust a few dozen commercial VPN servers over a couple thousand specifically maintained unindexed Tor Bridge Relays? I think not, as that would make traffic analysis more likely and more statistically powerful. Give the link a read. The only true way to attain some form of 'true' anonymity in this age is chained High Latency connections (i.e. snailmail pace), using chained remailers with randomized time delays. Or use that remailer function with I2Bote on I2P with the same effect but has the added benefit of more users providing cover traffic to the network. >bitcoin exchanges http://localmonerogt7be.onion/faq (LocalMonero, this escrow has an i2p address and clearnet site too) I would use XMR for local reputation-based exchanges when you have the chance. I don't recommend holding onto any volatile crypto for a longtime though, unless you want speculate on a cryptocoin. I'd convert soon into cash then whatever else. >>1030 >lots of exchanges are also simply scams >>1002 >how to buy crypto without telling god and country my name https://en.wikipedia.org/wiki/Decentralized_exchange DEX is a good way to distribute trust if you are skeptical of central exchanges handling your trades and private info. A good thing to know it exists. Some exchanges are more designed with your data privacy in mind, some saving only necessary transaction data locally on your machine. https://bisq.network/faq/ Is one (DEX) D.ecentralized EX.change that uses P2P over Tor for its nodes. Take it with some salt but THIS got me hard: "Bisq does not hold any bitcoins. All are held in multisignature addresses rather than a Bisq-controlled wallet. National currency is transferred directly from one trader to the other. Bisq uses a peer-to-peer network over Tor. This means there are no servers to be hacked or DDoS'd. Bisq does not know traders. No data is stored on who trades with whom. Bisq does not require registration. This means privacy is maintained, there are no “approval” wait times, and identity theft is impossible. Bisq is not a company. It is an open-source project organized as a Decentralized Autonomous Organization (DAO)." Aside from legitimate activities, money laundering shouldn't just be for the rich. All citizens should have the same opportunities to break the law or we get corrupt stagnation. You should however realize that it is up to you to find the best means to convert your funds into what you "NEED" and not live beyond your means. Be wise.
there is literally no reason to use a commercial vpn when there is so many other options
>>1097 >no reason With most free vpn, you are the product that's for sale. Not to say paid services don't ever sell data, I assume they do later in their life cycle
>>1098 Why not host a VPS at that point?
useful bread needza BOOMP
page 9 Bump
F. 'ZX'-,, VGZ
>>1014 >I always look at products/services this way: if it's being shilled in the strangest of places by dozens upon dozens of people or through dozens upon dozens of outlets, it's likely either a shit product/service or Jew-influenced to hell and back. That and if the deal/price is too good to be true, it probably is. so much this
(24.25 KB 255x218 Kikebusters.jpeg)
(70.42 KB 360x361 Say No To Kike Bait.png)
>no one mentions that Nord is obvious as fuck purely because it was allowed to be openly shilled on jewgle I may not be a tech wizard, but it's obvious to me that nothing on jewgle is going to be good for you.
>>983 Never get a VPN using your real info. Sure, the VPN service might says it doesn't keep logs. But what they don't tell you is that they don't keep logs on YOUR machine, but I am sure they are logging your activities on their servers. Pro-tip: If you have to give out your real info, you aren't maintain anonymous.
>>1104 Nord sucks. I used once then cancelled my suscription because it kept pointing to US nodes when I specifically told it not to.
>>1073 Tor used to be cool, but then it got glowniggered. Be careful when using Tor as their nodes are monitored by glowies
I use SoftEther and Ultrasurf. I basically stack the 2 VPNs. I know this is probably a retarded method. Any suggestions?
yes, which is why you should use McDonald's wifi or tor
>>983 Because the information would get sold only to the FBI/CIA american entities. So if you live in any other country...in europe....as long as you are not a literal terrorist/pedophile your country wont have the power and money to request info and threaten a VPN from another country.


no cookies?