Viewing a single comment thread. View all comments

zombie_berkman wrote

Lol @ them thinking they are a leet haxor for editing their boot config and source.list but never thought that those up addresses are all tor and VPN up addresses. And this is why everyone should get a vpn


[deleted] wrote (edited )


ziq OP wrote

And most of the others were VPNs.


PositiveFreedom wrote

You have a suggestion for a mobile and laptop VPN?


mcv137 wrote

ProtonVPN! It makes a nice companion to ProtonMail, too.


zombie_berkman wrote

If you are just trying to hide your up PIA is cheap and fast. Plus it works with openvpn and has strong encryption if you care about that too


alqm wrote (edited )

Complementing the other suggestions:

ProtonVPN has its infrastructure in Switzerland, which is not part of "the fourteen eyes of surveillance" and cannot be forced to hand over the data. Their email service ProtonMail is quite popular for being a more secure email. I would have more reasons to trust this one, but no VPN provider can be 100% safe. Tor is the best bet, albeit slow (gets faster as more users start relaying it).

Private Internet Access (PIA) is known for its support for open source projects, popularity among GNU/Linux users and native application for Ubuntu-based distros. However, since it is based on the US, it is required to hand over any data they have on their users to the government agencies when requested. Your privacy will depend on how much data PIA retains from your activities. It's a matter of trust. But at least you will be safe from IP loggers such as the one mentioned on the screenshots.

EDIT: ProtonMail's frontend is open source! Just in case you're wondering if they care about software freedom. You can check their blog here.


zorblax wrote

I have my own server that I use as a SOCKS proxy(among other things). It's nice, and if you run a tor node at the same server at the same time it hides your traffic really well.


zombie_berkman wrote

I see you like to live dangerously


zorblax wrote

Heh. Proxychains-ng and a proxy switcher plugin for my browser make it really easy to intersperse this with regular traffic and tor traffic. Anything illegal/sekrit I use whonix for.

I've always figured, keeping my browsing habits completely anonymous isn't always necessary -- after all, I don't care if the NSA knows my mundane browsing habits. The proxy is for fooling my ISP.

(also it's technically shadowsocks -- I would never dream of using an unencrypted proxy!)