zombie_berkman wrote
Lol @ them thinking they are a leet haxor for editing their boot config and source.list but never thought that those up addresses are all tor and VPN up addresses. And this is why everyone should get a vpn
[deleted] wrote (edited )
zombie_berkman wrote
No fucking way, that cant be real. BTW I run arch
ziq OP wrote
And most of the others were VPNs.
PositiveFreedom wrote
You have a suggestion for a mobile and laptop VPN?
mcv137 wrote
ProtonVPN! It makes a nice companion to ProtonMail, too.
zombie_berkman wrote
If you are just trying to hide your up PIA is cheap and fast. Plus it works with openvpn and has strong encryption if you care about that too
alqm wrote (edited )
Complementing the other suggestions:
ProtonVPN has its infrastructure in Switzerland, which is not part of "the fourteen eyes of surveillance" and cannot be forced to hand over the data. Their email service ProtonMail is quite popular for being a more secure email. I would have more reasons to trust this one, but no VPN provider can be 100% safe. Tor is the best bet, albeit slow (gets faster as more users start relaying it).
Private Internet Access (PIA) is known for its support for open source projects, popularity among GNU/Linux users and native application for Ubuntu-based distros. However, since it is based on the US, it is required to hand over any data they have on their users to the government agencies when requested. Your privacy will depend on how much data PIA retains from your activities. It's a matter of trust. But at least you will be safe from IP loggers such as the one mentioned on the screenshots.
EDIT: ProtonMail's frontend is open source! Just in case you're wondering if they care about software freedom. You can check their blog here.
zorblax wrote
I have my own server that I use as a SOCKS proxy(among other things). It's nice, and if you run a tor node at the same server at the same time it hides your traffic really well.
zombie_berkman wrote
I see you like to live dangerously
zorblax wrote
Heh. Proxychains-ng and a proxy switcher plugin for my browser make it really easy to intersperse this with regular traffic and tor traffic. Anything illegal/sekrit I use whonix for.
I've always figured, keeping my browsing habits completely anonymous isn't always necessary -- after all, I don't care if the NSA knows my mundane browsing habits. The proxy is for fooling my ISP.
(also it's technically shadowsocks -- I would never dream of using an unencrypted proxy!)
Viewing a single comment thread. View all comments