So I’m pretty recent to the high seas but I’ve seen a few posts now about “stop relying on your VPN” and “people that think VPNs will protect them are naive” and so on.

So since I believe knowledge is our greatest weapon/tool/super-power, can we get some answers regarding what exactly the doomsayers are getting at? ELI5 why VPNs wouldn’t protect your anonymity.

Is it about logging? The country your end-point is in? Something more technical?

Ultimately I’d like to be fully armed in order to keep making the best choices for my fledgling ship as it navigates the vast, stormy seas.

  • Ilandar@aussie.zone
    link
    fedilink
    English
    arrow-up
    55
    arrow-down
    2
    ·
    2 years ago

    The people saying that are either idiots or private tracker snobs. VPNs are absolutely an important part of shielding yourself from any potential legal action, particularly if you are torrenting.

    It’s true that a VPN doesn’t make you or your activity completely anonymous - you are trusting the logging policy of your provider - and won’t necessarily protect you against a court order, for example. However the only realistic danger to a small scale pirate such as yourself is the copyright troll who traces torrent IP addresses back to your ISP, thereby identifying you. If you mask your IP address with a VPN, you prevent them from doing this efficiently and effectively protect yourself from the threat of legal action.

    • Banzai51@midwest.social
      link
      fedilink
      English
      arrow-up
      11
      ·
      2 years ago

      And encrypting your traffic so your ISP can’t definitively see what you’re doing. They can guess, but they can’t definitively tell. That encrypted traffic is a shield for your ISP. When an IP holder demands something, the ISP can say it is encrypted and they can’t read it. It forces the bulk of the work back onto the IP holder. If your VPN is doing what it claims to do, then the work of that IP holder gets extremely difficult to downright impossible.

      • Pulp@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 years ago

        The copyright troll would be sending the emails to the VPN provider’s host. They won’t even know who your ISP is.

      • themoonisacheese@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 years ago

        Every site on earth has been using https for multiple years. The only thing that is visible to your ISP has been the server’s address for a while. VPNs just got encrypt that as well, but that’s about it.

        • AvgApartheidLover@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 years ago

          And yet, if you use a cheapo VPN with a well-known address (shared IP) sites like Amazon, or even Wikia will block you. Why? If most of your information is ‘private’ anyways, why go through the step of preventing a potential customer/user just because of their IP?

          Because in reality, even such a minor thing as a dinky $3/month VPN is a huge headache for people trying to farm relevant information from you. Public Cookies, Basic Telemetry, and really any sort of ad-relevant data is pretty much publically available to any interested party, and even the simplest VPNs screw that up to a large degree.

          People don’t go out of their way to spend a couple of bucks on a VPN and reserved IP because they think they’re gonna defeat the CIA or become a Net Ghost, they do it to get around region locks, IP bans, localized pricing (and yes to pirate their favorite movies/video games).

          • themoonisacheese@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 years ago

            This isn’t why. They refuse service because a large part of DDoS, scam and generally unlawful trafic comes from VPNs (because the criminals are the ones interested in masking their true IP, for police evasion). If your site has a payment form, it is financial suicide to not block common VPN IPs because carders will use it to test their ill-acquired cards. If your site has a way to make a request that cost a lots of resources, you want to block VPN IPs because otherwise your site gets DoSed to hell and back by anyone who has a problem with you. The collateral damage of blocking people who deny you one data point to track them is completely acceptable to these businesses.

  • CausticFlames@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    33
    ·
    2 years ago

    The thing with VPN’s is that you’re only shifting the trust from your ISP to your VPN provider. That provider can still see pretty much everything you’re doing and your real IP, if they wanted to. To add to this, plenty of VPN companies have been found logging when they said they didn’t. I would say either set up traffic for I2P, or simply go with an actually no logs VPN company like Mullvad, who’s been battle tested and doesn’t log, and you’ll be fine.

    People also say that because it’s important to understand what a VPN is and does as well. It wasn’t originally meant to be any sort of anonymity tool, the technology exists to make it seem as if your traffic is coming from somewhere else - which allows for things like remote work on a local network.

    • myersguy@lemmy.simpl.website
      link
      fedilink
      English
      arrow-up
      14
      arrow-down
      1
      ·
      2 years ago

      Important to note that Mullvad has stopped allowing port forwarding, if that is important to your VPN needs. I’m giving ProtonVPN a try now (though they don’t make Linux usage as friendly as I’d like)

    • HelixDab@kbin.social
      link
      fedilink
      arrow-up
      5
      arrow-down
      1
      ·
      2 years ago

      I would say either set up traffic for I2P

      Any ideas on how to do this? I’ve tried using i2p–in Firefox–and can’t seem to make it work. Sites that are supposedly up won’t load. I’ve followed all the tutorials that I’ve found, and it doesn’t seem to be doing what’s expected. And no, I can’t give any details at this second, because I’m away from my home computer, and it’s been a few months since I tried.

        • HelixDab@kbin.social
          link
          fedilink
          arrow-up
          1
          ·
          2 years ago

          I’ve got the extension up and running, but that doesn’t seem to do the trick. I reset my proxy settings every time I try to connect (I can’t connect to the internet normally if I use i2p proxy settings, and can’t connect to i2P if I don’t); i don’t recall off the top of my head if FoxyProxy worked correctly for me or not.

          I will check out the thread on wizanons.de and see if that helps at all.

    • CmdrShepard@lemmy.one
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      2 years ago

      Skip Mullvad. They’re removing port forwarding at the end of the month. I’ve been with them for years and unfortunately have to switch providers yet again.

        • CmdrShepard@lemmy.one
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 years ago

          I am going to switch to AirVPN after some limited googling based on price, popularity, and port forwarding (the three 'P’s). I dunno a whole lot about them but my main priority is just hiding my IP from movie studios and port forwarding. I don’t need my traffic locked down like Fort Knox.

      • justinalanbass@kbin.social
        link
        fedilink
        arrow-up
        0
        arrow-down
        1
        ·
        2 years ago

        Eh don’t bother. You weren’t as anonymous as you thought using port forwarding if you’re doing anything bad enough to warrant NSA attention. Most users probably are not. Mullvad is just being honest about their limitations here.

        • CmdrShepard@lemmy.one
          link
          fedilink
          arrow-up
          3
          ·
          edit-2
          2 years ago

          I doubt the NSA will come after me for sharing some movie files, so I’m not really worried about that. Port forwarding is essential though as you won’t be able to seed any files to 99.9% of leechers, which is an issue with private trackers and goes against the concept of p2p sharing in general.

          Mullvad is removing port forwarding because a few bad apples spoiled the bunch by using their service for highly illegal things and its bringing too much attention to the company, as they described in their press release. They aren’t removing it because they can’t keep things anonymous (which is why they removed the automatic monthly subscription some time ago).

  • leraje@kbin.social
    link
    fedilink
    arrow-up
    19
    ·
    2 years ago

    A VPN doesn’t make you anonymous, it enhances your privacy. If you login to a named FB account you’re still you. All you’ve done is tell FB you’re using a VPN.

    In terms of torrenting, a VPN client, if configured correctly, encrypts all data between the device its on and the endpoint. This means your ISP cannot spy on what you’re doing. When you leech or seed it also masks your real IP.

    But you have to trust your VPN provider isn’t logging you. And if you use a provider who’s located in a good country (legally speaking) but they own or rent servers in not so good countries (5 eyes etc) and you connect via those servers then the provider has no physical access to them. Tracking could easily be carried out without their or your knowledge.

    If you pay a provider with a card or PayPal then there’s a paper trail to you. Use a VPN that accepts Monero or cash physically mailed to them.

    Make sure your VPN network interface is bound to your torrent client so if your connection drops, your IP isn’t exposed.

    • plexnose@geddit.social
      link
      fedilink
      arrow-up
      4
      ·
      2 years ago

      your ISP cannot spy on what you’re doing.

      ISPs dont monitor torrents, they just pass on complaints from copyright trolls. ISPs have no interest in inspecting your torrent traffic and have always resisted any attempts to make them do so.

      • FunkyClown@lemmy.fail
        link
        fedilink
        arrow-up
        3
        ·
        edit-2
        2 years ago

        Exactly. In Australia by law they had to block certain websites. All they did was block it via their own dns servers as it’s easy and cheap. All you have to do is use google/Cloudflare etc… for your dns and it works fine. They only care if you get complaints/legal stuff.

    • Pulp@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      2
      ·
      2 years ago

      undefined> Make sure your VPN network interface is bound to your torrent client so if your connection drops, your IP isn’t exposed.

      This is the most important step, for most even if provider logged them it’s not going to be the problem when you’re just torrenting

  • PurrJPro@beehaw.org
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    1
    ·
    2 years ago

    VPNs protect your IP address, which is useful, but it ends there. Your IP is known to your VPN provider and can even still be found by those tech-savvy enough if you don’t take the right precautions. Basically, VPNs are useful, but don’t expect them to be the ultimate privacy multi-tool. It’s more like one of many different tools to protect yourself online

    • Fell@ma.fellr.net
      link
      fedilink
      arrow-up
      10
      ·
      2 years ago

      @PurrJPro @jordank1977 The thing is, VPNs create enough friction for authorities to stop them from tracking you down for downloading a movie.

      Also, in some countries it’s not even authorities catching you torrent stuff, it’s asshole lawyers who basically bounty hunt for media companies. It’s only viable for them to screw over hundreds of people at once, they’re unlikely to try and argue with a VPN provider.

      • plexnose@geddit.social
        link
        fedilink
        arrow-up
        1
        ·
        2 years ago

        VPNs create enough friction for authorities to stop them

        Its not ‘authorities’ you are hiding from when pirating, its just copyright trolls. All they do is scrape IP addresses from torrenst and automatically send a notice to the relevant ISP. If that IP belongs to a VPN provider, the compaint will never reach you.

  • plexnose@geddit.social
    link
    fedilink
    English
    arrow-up
    15
    ·
    2 years ago

    There’s often a lot of bad information about VPNs which is never backed up with any actaul evidence.

    Sure, you have to make sure its working properly and bound to your torrent client, but if it is, then that’s enough to protect you from copyright claims.

    There is no evidence of any commerical VPN provider ever responding to a copyright notice. People mistakenly think this, when all that’s really happened is they were not connected properly and their ISP got the notice direct. There is no situation where the copyright troll contacts the VPN provider, find the real user, then somehow makes the ISP send a notice to them. Doesn’t even make sense.

    • hardypart@feddit.de
      link
      fedilink
      English
      arrow-up
      22
      ·
      2 years ago

      There is no evidence of any commerical VPN provider ever responding to a copyright notice.

      Because doing so would put them out of business faster than you can say “fuck Spez”.

      • plexnose@geddit.social
        link
        fedilink
        English
        arrow-up
        14
        ·
        2 years ago

        Exactly - snd yet people still claim their ‘VPN ratted them out’ - it didn’t - it might hve failed, or the user never turned it on, but the VPN provider didn’t get a copyright notice from Disney and forward it an ISP.

        • Takatakatakatakatak@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          8
          ·
          2 years ago

          Spot on. All you need to do is change adaptor in your torrent client so that it is only allowed to work with the virtual network adaptor set up by your VPN software. That way even when your connection falters, it’s never allowed to send a single packet via your raw network adaptor.

    • state_electrician@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 years ago

      Depends. There are varying levels of opsec and you need to tailor your precautions to the level of your opponent. In my country ISPs must deliver data if asked by a court. They can only ask for a specific IP address at a specific time. And then they would get my address. A VPN provider outside of my country doesn’t give a crap and ideally also doesn’t have any data to begin with. There is no way for the content industry to collect data beyond the ISP. First, because there is no legal right for them to get that information and secondly because it’s too expensive. Now, if you are trying to hide stuff from the government, then I’d argue that a simple VPN is not enough.

        • state_electrician@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          5
          ·
          2 years ago

          Like I said, if you’re trying to hide from your government, your opsec requirements are on a whole different level than those of someone trying to download a torrent. You don’t need to use TOR over a public wifi while booting Tails from USB on your laptop if you want to download Fast X. A VPN that is either not required or even better just cannot provide information to the content industry is quite sufficient in that case.

        • Socsa@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 years ago

          The five eyes stuff is dumb. For starters, this is is a technical question, not a political one. If your OPSEC relies on guessing where the CIA does or does not have resources, you fucked up.

          I can assure you, the CIA is perfectly capable of buying colo racks in Slovakian datacenters.

    • justinalanbass@kbin.social
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      2 years ago

      Well, your VPN knows your address so this advice is pointless. Unless you only access your VPN through a totally anonymous ISP at a totally random location on the planet each time, probably impossible due to KYC laws, you are certainly not anonymous.

      • plexnose@geddit.social
        link
        fedilink
        arrow-up
        3
        ·
        2 years ago

        For piracy purposes its irrelevant. The VPN provider won’t send you a complaint or give your details to a copyright troll. If you are hiding from the governement then maybe its a different story, but a copyright holder doesn’t have the ability to force a VPN to do anything.

  • Moonrise2473@feddit.it
    link
    fedilink
    English
    arrow-up
    14
    ·
    2 years ago

    It depends what are you doing. Torrenting child porn? A VPN won’t change anything because they’ll hopefully collaborate with law enforcement to track you down.

    Torrenting a tv show? Usually the vpn company will ignore any requests from law enforcement as it’s not a real crime

      • Uriel-238@lemmy.one
        link
        fedilink
        arrow-up
        4
        ·
        edit-2
        2 years ago

        Copyright infringement is not a crime. It’s grounds for a civil suit, but it looks really bad for Sony entertainment to try to bleed tens of thousands of dollars from a poor family trying to watch a movie they couldn’t afford to watch in theaters.

        Possessing or viewing CSAM is so severe a crime, you need a lawyer to dispose of it. To not do so is to stay in possession of it, which is a felony. To destroy it is destruction of evidence, which is a felony. Your only recourse is to stuff it in an unmarked box, and ask your lawyer to anonymously hand it over to the local precinct. It is essentially social toxic waste.

        ETA [rant] Note that a) Sony (and all the other major studios and publishers and record labels) gladly pirates IP that is not theirs, and also underpays the people that produce their content. And b) Sony freely engages in dark patterns and odious TOSes which is one of the reasons I haven’t been able to play Sony games in years. So it is actually more ethical to pirate Sony content (or again, that of any major studio, record label, publishing house or AAA game company) than it is to pay the company and support their ongoing abuse of workers, end consumers and the market.

        Also there is one thing you can do to them that is worse than pirating their content, and that is not pirating their content. [/rant]

        • SimplyKnorax@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          ·
          2 years ago

          I’m not against pirating, I’m all for it. But copyright infringement is a crime (it might not be the case for all countries though!) Companies might not necessarily act on it on an individual level, but they still can put pressure on ISPs to track this kind of traffic. Either way, it’s better to use a VPN than not using one just to be safe!

          • Uriel-238@lemmy.one
            link
            fedilink
            arrow-up
            1
            ·
            2 years ago

            You’re right that I should have specified the US, and will edit my original comment.

            It’s not a crime in the US that has state-served sentences like fines or imprisonment, rather is a civil infraction. Granted, the media trade organizations like the MPAA and RIAA would very much like to make copyright infringement felonious, but that could easily lead to overenforcement and filling our already impacted prisons even more.

            I’ve heard the European watchdogs are more severe and will go after grandmothers who play radios too loudly regarding public performance regulations.

            But we’re in an era in which states are passing laws to make persons illegal or strip them of their rights, so we can’t rely on the state (any state) to fairly assert how their populations should behave, and Disney has been an IP-maximalist shit since the mid 20th century.

            So our respect of legality should only extend to what can and will be enforced. The Sheriff of Nottingham does not deserve our obedience. (Prince John neither)

      • axus@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        2 years ago

        Me too! The world would be worse without free TV/movie/software.

    • plexnose@geddit.social
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 years ago

      because they’ll hopefully collaborate with law enforcement to track you down.

      Unlikely - most of the time they won’t have any logs anyway.

      People get caught for CP and other crimes due to lapses in their own security usually - reusing user names across sites, details in photos that can be identified, or simply using a non encrypted connection one time.

  • DrLongTRL@feddit.de
    link
    fedilink
    English
    arrow-up
    14
    ·
    2 years ago

    Almost every time “regular” people get in trouble for piracy, the reason is that they seeded something, a copyright law firm (or their contractor) noticed it, noted their IP address and then either went and got the real life address from the ISP so that they could send you “the bill” or they made the ISP send you something, depending on where you live really.

    That means, as long as that that IP address that shows up on that law firms screen isn´t actually “your own”, isn´t immediately traceable to you simply by calling up your ISP, you´re already one step ahead in the game.

    That law firm might still try to contact the owner of that IP though, either to send them “a bill” or to get them to rat on you. And that´s why it is important that your VPN provider operates in a way that allows them to simply ignore that. Either by operating out of a country that doesn´t mandate them to “help finding you” or by simply not keeping any logs of what actual IP was connected to what VPN IP at what time.

    So if you have a VPN provider that maybe operates out or through a country where piracy is legal or has proven through audits that they couldn´t rat even if they wanted, you´re highly unlikely to get into any trouble.

  • crankylinuxuser@midwest.social
    link
    fedilink
    English
    arrow-up
    14
    ·
    2 years ago

    Using a VPN and HOW you use it all depends on your operational security (OPSEC).

    If you’re a pirate consumer, then basically you need to keep your ISP from knowing what you’re doing, to prevent copyright strikes or shit-letters from Disney etm. A good VPN is fine.

    If you’re a torrent creator, you need to raise your security a bit, depending on the “hotness” of the content. Rare anime torrent? Eh who cares. But you’re hosting HDCams from a movie released yesterday, or games that will be released officially in a week? You need to use a VPN in a country that does not have good relations to your country of origin. Yes, that means if you’re in the USA, get a Russian or Chinese VPN.

    If you’re leaking state secrets, Snowden talked about what he did. He cracked wifi within a 2h drive distance, used a 12dBi yagi antenna, with a burner laptop loaded with Tails (Tor linux distro), and only used 1 cracked wifi per use. Never went back to the same place. Then again, he didn’t exactly fare well eventually.

    • Socsa@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      2 years ago

      In addition to this, boost your anonymity by buying second hand equipment off local marketplace apps. And make a mobile jumpbox that you can plug into random USB ports and leave there, connected to public wifi.

      Tbh, I’m hesitant to ever suggest a Chinese VPN. That’s a great way to paint yourself with a target. 90% of good tradecraft is never giving anyone a reason to look at you.

    • demonicbullet@lemmy.fmhy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 years ago

      If you’re doing the snowden shit your best covering your entire face and going to a local Starbucks with a tails laptop, dumping every file at once, and ditching the laptop.

      Still just get out of the country and upload then.

  • justinalanbass@kbin.social
    link
    fedilink
    arrow-up
    8
    arrow-down
    1
    ·
    edit-2
    2 years ago

    That sentiment isn’t so much about piracy, but general security. Do keep in mind that the NSA can easily sniff your VPN traffic, even through logless Mullvad in theory, and access your account information to correlate and deanonymize you via subpoena. This is done routinely, and there are thousands of illegal subpoenas done yearly with no repercussion. Fortunately it seems the NSA is only going after heinous criminals, but that could also change. To be truly NSA safe is nearly impossible - did you know your password can be determined by a simple audio recording of you typing it? The NSA has frequently snuck into private residence to install keyloggers as well. What will a VPN matter in such a case?

    So a VPN might prevent a DCMA notice from your ISP, but if the NSA starts caring about piracy y’all are out of luck.

    • Banzai51@midwest.social
      link
      fedilink
      arrow-up
      4
      ·
      2 years ago

      The NSA is always going to have bigger fish to fry than busting individuals for IP violations. Risks exposing their methods in court and allowing their real targets the opportunity to harden their security even more. It would be an incredible waste of their resources.

      • justinalanbass@kbin.social
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        2 years ago

        They’re pretty exposed already, and in my opinion their targets probably can’t do much to protect themselves unless they are part of a foreign government, like the Kremlin. But yea they haven’t gone after piracy yet.

    • Armbar@kbin.social
      link
      fedilink
      arrow-up
      2
      ·
      2 years ago

      Do keep in mind that the NSA can easily sniff your VPN traffic, even through logless Mullvad in theory, and access your account information to correlate and deanonymize you via subpoena.

      Can you say more about this?

      • justinalanbass@kbin.social
        link
        fedilink
        arrow-up
        2
        ·
        2 years ago

        The NSA has unlimited legal power in this context. They can legally go to any US VPN, copy all traffic onto their massive servers, and use it as they want. They probably already do this, although that claim is unverifiable. That traffic contains your IP address and the websites you’ve viewed, clear data of torrents you’ve downloaded, etc. Mullvad, being outside its jurisdiction, is possibly safer, but presumably since they operate servers in the United States at least those could be sniffed. There is precedent for all of this.

        While it’s unlikely for you to specifically be targeted, my point is that you can never be truly anonymous on the internet.

      • leraje@kbin.social
        link
        fedilink
        arrow-up
        1
        ·
        2 years ago

        Its trivial to find out youre using a VPN and which one and which of their servers youre using. If you pay for your VPN with identifying information (a card, PayPal etc) then they can theoretically make the provider log your specific activity.

  • Pestilence@feddit.de
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    2 years ago

    Yes, an VPN is not private, because you trust your VPN provider instead your internet provider. But as a german, it’s pretty clear that all internet providers would give your name and adress to everyone that asks for it, regardless if you download something through torrent or stream something without the license. I would bet, in near future you cant even download a 30 years old ROM for an emulator, without getting a mail from Nintendos lawyers.

    And yes, i trust Mullvad more then my internet provider. All of my devices are connected to Mullvad and i had never any problems.

    • owiller@kbin.social
      link
      fedilink
      arrow-up
      11
      ·
      2 years ago

      Interestingly, Mullvad was recently raided by the Swedish authorities. They’ve got documents from the police about the raid: no customer data compromised because there wasn’t any.

      The Swedish authorities answered our protocol request

      Contains the documents and the relevant pieces of Swedish law. Now, up to anyone to decide if that’s secure enough with other precautions.

  • PeterCxy@metapowers.org
    link
    fedilink
    English
    arrow-up
    6
    ·
    2 years ago

    people that think VPNs will protect them are naive

    The correct way to phrase this should be

    people that think VPNs alone will protect them are naive

  • Thomas Gray@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    3
    ·
    2 years ago

    Try to find a VPN that’s a nonprofit or community oriented. Usually the VPNs with the most marketing and advertising are the most profit driven and less concerned about your privacy. Use DDG, Brave search or anything but Google to research. A lot of people don’t understand that Google is just an advertising company that uses it’s search engine sell products, they also get commission through referral, so it’s in the company’s interest for you to pay more.

  • EvilMonkeySlayer@kbin.social
    link
    fedilink
    arrow-up
    5
    arrow-down
    1
    ·
    2 years ago

    I think the big issue with commercial VPN’s are that you are trusting your traffic through someone else’s infrastructure where they’re typically a target for malicious actors.

    If you want to be relatively sure of your privacy, use something like a cloud vm from for example digitalocean and install wireguard on it using https://pivpn.io

    I have a home vpn where I connect to my home lan using the wireguard vpn app on my phone. Which means I get more privacy since mobile providers often slurp up dns queries to sell to advertisers and also it allows me to use my pihole for adblocking on my phone.

    • Pulp@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      3
      ·
      2 years ago

      For piracy/illegal activities, note that digitalocean account & ip is directly tied to you, unless you manage to create one completely anononymously

    • postscarce@kbin.social
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      2 years ago

      At the end of the day arguments for or against a particular solution are going to depend on what threats a person considers most important to protect against and where they’re willing to put their trust.

      • CmdrShepard@lemmy.one
        link
        fedilink
        arrow-up
        5
        ·
        2 years ago

        And if all you’re doing is downloading torrents, your need for protection is pretty low as all you’re trying to do is hide your IP address from some corporate lawyers.

    • ipkpjersi@lemmy.one
      link
      fedilink
      arrow-up
      1
      ·
      2 years ago

      So one of the lesser mentioned benefits of commercial VPN’s is that they have shared IPs. If you are renting a VPS from like DigitalOcean, it’s much easier to prove that the IP browsing a website belongs to you when that IP is dedicated to your VPS that is paid for by you.

    • ipkpjersi@lemmy.one
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      2 years ago

      Interesting, that’s exactly what I did. I am renting a VPS and am running my own OpenVPN server on that, and then my OpenVPN client connects to that VPN, and the OpenVPN server forwards traffic for specific ports to my OpenVPN client using iptables prerouting DNAT rules.

      • AlphaCharlie@lemmy.pt
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        I work in aviation so my use of a VPN is limited to the public wifi at the airport and torrenting.