Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.
posted by paulej72 on Monday March 17 2014, @12:55AM   Printer-friendly
from the you-can't-find-me dept.

Angry Jesus writes:

"The TorrentFreak news site just released their latest annual survey of VPN providers' privacy policies. The results are very encouraging: it seems that the idea that online privacy is important is becoming more widespread and the price is quite affordable, just a few dollars a month.

For nearly a year I've been using one of the VPN services on their list. Not so much for the anonymous bit-torrent capability, but rather to frustrate Big Data's attempts to track me. I typically use domestic USA end-points and switch between 10-20 of them during the course of the day. That is coupled with various privacy extensions to Firefox (blocking cookies, JavaScript, Flash, ads, cross-site includes, and randomizing my user-agent). So far, I've been quite happy with how it has worked out. Even if I can't protect myself from the NSA, I can protect myself from just about everyone else."

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Insightful) by Barbara Celarent on Monday March 17 2014, @08:44AM

    by Barbara Celarent (790) on Monday March 17 2014, @08:44AM (#17456)

    If you don't own the machine, especially if you don't control the logging on the machine, it isn't private. It doesn't matter if you have an VPN if the server is logging the packets. Those logs can be confiscated. If it isn't yours, by definition it isn't private.

    As a compromise you could rent a small vserver for 8 euro a month [hetzner.de] and put softether [softether.org] on it yourself. As a bonus you can connect all your pc's on the same virtual network. Then you have fine grained control over logging and even set up a transparent proxy, etc.

    Starting Score:    1  point
    Moderation   +3  
       Insightful=2, Interesting=1, Total=3
    Extra 'Insightful' Modifier   0  

    Total Score:   4  
  • (Score: 4, Interesting) by wantkitteh on Monday March 17 2014, @09:11AM

    by wantkitteh (3362) on Monday March 17 2014, @09:11AM (#17468) Homepage Journal

    I think you may have missed the point here. Your scheme is fundamentally flawed* in that you are the only person using it so all the outgoing traffic can be directly attributed to you via the billing information for the vserver. The advantage offered by VPN services is that once the traffic is traced back to the final node in the VPN network, it can only be attributed to "A.N.Other VPN User" and not directly to any specific user.

    TOR uses exit nodes in the same way to decentralize the provision of this exact principle. Running a TOR exit node on your own connection, while inconvenient at times due to the traffic volumes and countermeasures some services/networks put in place against it, also gives you the same lost-in-the-crowd protection for your own locally-sourced traffic.

    (*as opposed to potentially flawed)

  • (Score: 4, Funny) by FatPhil on Monday March 17 2014, @10:15AM

    by FatPhil (863) <pc-soylentNO@SPAMasdf.fi> on Monday March 17 2014, @10:15AM (#17490) Homepage
    But they asked the VPN providers "can we trust you?", and they answered "yes, of course you can trust us!". If that isn't convincing, I don't know what is.
    --
    Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves