by ductionist on 10/22/19, 5:40 PM with 257 comments
by thothamon on 10/22/19, 10:52 PM
Surely you shouldn't depend on that alone. Tor would be a wise additional layer of protection, if applicable. But to suggest that you get no privacy benefit at all from a VPN is like saying your host may be compromised, so you might as well use regular telnet rather than SSH.
by linsomniac on 10/23/19, 12:06 AM
However, if you don't use a VPN: Your ISPs (Broadband, coffee shop, whatever) can see all your traffic!
20 years ago I passed ALL my traffic on my laptop through a VPN, I just happened to run my own. But back then much less of the standard traffic was encrypted. Now, pretty much all web traffic is encrypted. So that makes the VPN less of a concern, IMHO. Depends on what you're doing though...
There was this one time I went to Defcon. Installed a scratch laptop for it. The firewall on it would only allow DHCP and OpenVPN on the physical interfaces.
by tomxor on 10/22/19, 11:18 PM
For routing all your internet it's as simple as this (on the client only, no server setup):
sshuttle -r user@1.2.3.4 0/0
That's it... server requirements are met by almost anything, you don't need root access, but it does need python, which most distros have by default. Now you can use your own little obscure server, yes it's not invulnerable a VPS provider can still look at you if they wish, but it's far less of a target than a purpose built consumer VPN provider.It's also far more powerful for slicing up and mixing subnets or only routing specific targets ... for example unblock a specific site, but don't re-route other traffic:
sshuttle -r user@1.2.3.4 sci-hub.tw
[edit]Minor issue worth mentioning, not to disappoint people trying this out - it's currently necessary to use the -x option to exclude the server itself from being routed on Linux, I think this is due to a kernel bug? which is a little annoying, hoping this will go away eventually. This is not relevant to BSD or Mac, although on Mac you have other kernel bugs to worry about in XNUs network stack.
sshuttle -r user@1.2.3.4 -x 1.2.3.4 0/0
[edit]As "icelancer" has pointed out bellow, please note that using your own server ties your activity to your identity more definitively if you are the only one using the server and you pay for the server in your name. Not being a purpose built consumer VPN makes it a less likely target through significant obscurity, however in the event it IS targeted, it's uniqueness will make it easier to associate activity with you via the VPS provider.
> This also ties your identity to a provider definitively. That's fine, as long as you tell people that's what is happening. A good consumer VPN that isn't a garbage one offers plausible deniability.
by unicornfinder on 10/22/19, 9:26 PM
by bArray on 10/23/19, 3:26 AM
* Geoblockers - Much media content is blocked based on geolocation, specifically geolocation based on your IP. (Netflix, Youtube, etc.)
* IP blacklist - I know a few people that have inherited a blacklisted IP simply through unlucky ISP IP allocation.
* ISP logging - So not a hostile ISP, but one that actively tries to log your data. (If you live in Europe, this is almost definitely happening. Apparently in the US ISPs even sell this data.)
* Speed - A few people report being able to get a faster network connection. (I'm not entirely sure why this is the case, but I can imagine there being edge cases where this is possible.)
Setting up your own VPN is NOT solution to every problem mentioned here, especially if you want to switch server location on a whim or are not technically minded.
by juped on 10/22/19, 10:02 PM
by vesche on 10/22/19, 9:24 PM
Sure, you're always trusting a VPN at their word that they don't log, the above gives a detailed analysis of which ones you probably shouldn't trust. You can always host your own: https://github.com/n1trux/awesome-sysadmin#vpn
You can also VPN chain (l2iptables), tunnel over TLS, etc. That gist post is pretty dumb imo
by octorian on 10/23/19, 1:20 AM
Well, I had Apache misconfigured just long enough to get picked up by one of these apps. For years afterward, my server logs were chock full of attempts at logging into various accounts via HTTP. I seriously had thousands of Yahoo! username/password pairs just sitting in plaintext inside my server logs.
by S-E-P on 10/22/19, 10:44 PM
Hmmm? If you don't have record of it, the courts don't do much, at least in the US. If they subpoena you, and you don't have logs, nothing ever comes out of it. Outside of fines and things of that nature.
> The $10/month that you're paying for your VPN service doesn't even pay for the lawyer's coffee, so expect them to hand you over.
How do you think insurance works, or why airlines habitually overbook? A trivial word problem if you will: If you had 10,000 users, you were subpoena'd and only 100 users did anything worth prosecution, that's what. For one lawyer, drinking a $10 coffee (or two $5 dollar) every week day for a month. that's 20 days, $200 a month. $2,400 annually. Assuming in this example only 1% of your users need defending, that's 99% of your coffee budget you don't have to worry about! For 10,000 users, a yearly subscription pulls in about $1,200,000 (we aren't doing any adjustment for taxes and all that garbage). If 99% of your users are behaving themselves.. or at least not doing something bad enough for the courts to take notice (which in the digital age, things like piracy are white noise) that means you still have $1,188,000 to help you in those, typically blanket cases (i.e. a court case in which 20 of your users were downloading illegal movies, and MGM got really upset). Since if you aren't logging, these infractions are dealt with in aggregate usually, since it can't be quantified. So number of lawsuits < bad users.
That's not bad, if all your lawyers needed was coffee monthly, then you could support, with 99% of your users cash, 495 lawyers coffee for a year! more than enough coffee to defend your business. Don't forget you can still use the "blood money" you got to buy them coffee!
The basic principle behind my oversimplified, and somewhat tongue-in-cheek example was to remind you that insurance is a lucrative business. I wonder how they survive if your monthly cost for liability (up to $500,000) isn't $500,000 per month!?!
by danShumway on 10/22/19, 11:30 PM
----
> Your IP address is a largely irrelevant metric in modern tracking systems.
I don't believe this for one second.
Your IP address on its own is not sufficient to identify you. That doesn't mean your IP address is not helpful in identifying you.
If you have Javascript disabled, it is a heck of a lot easier to identify you with a combination of an IP address, user agent, and OS than it is to identify you without the IP address cutting down the pool of potential visitors.
On top of that, if you're targeting me and do a geo-location of my IP address, it will get you within 5 miles of my house. That's close enough that you'll know which county I'm in, which with a few other easily-obtained pieces of information will let you pull up my voter registration, which will give you my exact street address.
Of course, you could mitigate this by setting up your own VPN on something like Linode, but unless you're regularly rotating IP addresses, you've just traded a pseudo-identifier that multiple people/devices share for a persistent identifier.
This argument comes up all the time, and I have never heard anyone explain it in a way that passes my sniff test. If you want me to stop using a VPN, you need to do a lot better than just claiming that IP addresses don't matter -- you need to show some kind of evidence to back that up.
----
Broadcasting your IP address to every website you've ever visited is a completely valid concern that gets hand-waved out the wazoo whenever this subject comes up.
I've sent bug reports to sites that publicly tied IP addresses to comments/accounts so anyone could track your movement patterns over time. Yes, that info can be useful to an attacker trying to deanonomyze you. Yes, that info can be used to link users together. Yes, that info can be used to narrow the pool of potential visitors so other fingerprinting techniques are more powerful.
It is blanketly ridiculous to claim that an approximate county-level geolocation isn't a useful data-point to attackers. If IP addresses weren't useful, the Tor project wouldn't be going to such lengths to hide them.
by alkonaut on 10/22/19, 10:01 PM
The article lists several reasons to use VPNs but isn’t the biggest one these days simply to circumvent geographical content limitations for online services such as video streaming? Nearly everyone I know has used a VPN service at some point, and if you asked any of the non-technical ones what it is they might say ”a think that lets me watch the game broadcast when I’m in another country”.
People want proxies and the VPN providers provide VPNs that work like proxies. I can’t really see the downside to using the VPN as a proxy?
by cracker_jacks on 10/23/19, 12:47 AM
There's no point in privacy without access.
by devy on 10/22/19, 10:10 PM
On-prem VPN deployments with solutions like AlgoVPN[2] from TrailOfBits is still very useful. Let alone mass majority of the the corporate IT's internal VPNs that is required for some workforces to perform their jobs remotely on public Internet.
[1]: https://gist.github.com/joepie91/5a9909939e6ce7d09e29#gistco...
by icelancer on 10/22/19, 11:47 PM
This is demonstrably false; look at any VPN provider that was subpoenaed and unable to produce documentation.
by kryogen1c on 10/22/19, 9:52 PM
This is a tautology. If you use it as a proxy, then its a proxy. VPNs arent for this, and so are bad at it.
VPN use case is either to securely leave a network (hotel Wi-Fi, airport wifi) or to securely get to a network (home resources, corporate resources). If you want a proxy, find a proxy.
by johnjungles on 10/23/19, 3:35 AM
I think you mean that you shouldn’t think of a VPN as an anonymous traffic tool like they advertise.
by computerex on 10/23/19, 4:35 AM
www.cnbc.com/amp/2017/03/28/congress-clears-way-for-isps-to-sell-browsing-history.html
It's doesn't take a logical leap to infer that a company whose entire purpose and business model is to provide anonymization as a service is less likely to sell out its own customers than the ISP's.
Yes VPN's can log despite claiming they don't. But the well known ones are highly incentivized to do as they claim because lying would destroy trust and would ultimately destroy their business. Governments are also more likely to target giant national ISP's than some VPN provider whose servers are in some very liberal and consumer leaning countries outside the US. Also securing your own VPS on the internet and managing it without getting pwned is well outside the expertise of most people and is probably not recommended.
by jchw on 10/23/19, 12:02 AM
by tootahe45 on 10/23/19, 12:05 AM
by badrabbit on 10/23/19, 4:21 AM
by bloody-crow on 10/23/19, 4:10 PM
Second, your VPN provider could be in a different country, and that would make data mining your traffic slightly less interesting to them. It'd also make data acquisition via subpoena of some sort from your country slightly more bureaucratic.
Third, if you have reservations about your VPN provider, you can just cancel your account and go to a different one. Changing VPN providers takes 5 minutes, while changing internet service provider can take months, or in some cases might not even be possible.
by throwaway13337 on 10/22/19, 9:22 PM
Most people use VPNs to get out region restrictions.
These are getting more and more common due to local governments making laws that affect the whole internet - think GDPR - that individual site owners do not want to abide by so they block IPs. VPNs solve this very real problem for those still wanting access to the content.
They're also used for subverting content region licensing. For example, with Netflix.
by breatheoften on 10/23/19, 1:26 AM
I need to ssh back to my laptop frequently because of some annoying restrictions with a service provider I use (heroku). I _can_ do shenanigans with ssh tunneling on a publicly accessible server I control - but it’s actually pretty annoying to work that way in my scenarios.
I’ve tried a few vpn services that offer “static ips” but the services I’ve tried filter inbound connections to that ip ... does anyone know a good vpn service that can effectively gives me a public IP address so I can make inbound connections to my developer machine while I’m random shitty coffee shop WiFi ...?
by smurda on 10/23/19, 6:06 AM
Disagree. It is always easier for the legal team to say, “sorry we don’t store the logs” as a way to absolve themselves.
by p0cc on 10/22/19, 10:06 PM
* Remote Access VPN: Connect to resources on your corporate network. An example of this is you're in a coffee shop on holiday and need to access a corporate resource.
* Site-to-Site VPN: Connect networks on two sites together. An example of this is you're in a branch office and need to connect to a resource in HQ.
Note that VPN providers give you a limited Remote Access VPN to their network, which they control. They can do whatever they want to your now-decrypted traffic before they send it out to the internet. If you want to obfuscate your traffic, Tor is a better candidate.
by dontbenebby on 10/23/19, 3:41 AM
I really value not having to constantly leave my phone on, blasting my location to anyone who cares to ask.
https://www.vice.com/en_us/article/nepxbz/i-gave-a-bounty-hu...
(I self host my VPN, so I'm fairly confident the provider isn't going to jeopardize their entire business model to add extra analytics. Sites I visit get the IP of the VPN, and conversely my ISP sees my traffic going to a random server in Denver. It's win-win.)
by otakucode on 10/23/19, 12:11 AM
If the VPN provider has been ordered by a US court to produce log information, and they have appeared in court responding that it is not possible for them to do so as such logs do not exist, and the court has accepted this as true, that is adequate 'proof' in my eyes. It is something which puts them in the position of being extremely legally liable for in a way that advertising 'no logs' does not, since prosecution for false advertising is a joke.
by baby on 10/22/19, 11:15 PM
by linsomniac on 10/23/19, 12:14 AM
He ran a series of tests comparing latency and throughput of directly visiting sites on his home Comcast connection, vs. the VPN. Generally, the VPN was significantly faster.
I wasn't entirely surprised by this. Our facility had multiple high quality connections (Level-3, InterNAP), and one of those traffic optimizers that would add intelligence beyond just BGP.
by systematical on 10/23/19, 2:53 AM
I've also had edge-cases where I need to obscure my country of origin. For instance, I couldn't stream Game of Thrones via Hulu/HBO Go this Summer while in Mexico. For some reason, Mexico is blocked. My VPN solved that.
For security? It's unlikely to help unless I am on an unsecured wireless network or something like that. Good read nonetheless.
by user4142 on 10/22/19, 11:48 PM
Today, if you change you DNS to another resolver, your IPS won't bother because majority will not change and you can pass under their radar.
With DoH, IPSs will be forced to log filtered/mapped IP requests so they can keep doing whatever they're doing today with DNS queries.
So, when DoH matures, IPS won't see your DNS queries but it won't matter for them any more as they will be seeing all other requests
by exabrial on 10/23/19, 2:26 AM
I know this is not a popular stance on HN, but ipv4 has built in casual anonymization, whereas ipv6 had built in casual identification. Both systems are defeatable, but what bothers me about ipv6 is that the invasion of privacy is the default.
Coincidentally, Google, Facebook, et all are pushing ipv6 very hard.
by davedx on 10/23/19, 6:38 AM
by neumann on 10/23/19, 11:49 PM
by terrycody on 10/23/19, 2:14 AM
Just try to use a very random username and password, payment can set to pay as a VCC or one time method.
by ComodoHacker on 10/23/19, 7:41 AM
by jacques_chester on 10/22/19, 9:18 PM
One of these markets involves competing on security and privacy. One of them involves colluding on influencing FCC policy.
So even if a particular VPN provider is inept or corrupt, my expected return on the investment is higher than trusting TWC.
by sjy on 10/22/19, 10:00 PM
by cookie_monsta on 10/23/19, 8:16 AM
https://krebsonsecurity.com/2017/03/post-fcc-privacy-rules-s...
by bitL on 10/23/19, 3:09 AM
by Havoc on 10/22/19, 9:58 PM
Would there be any benefit in using a number of VPS round robin style? I've got access to a handful...
by nly on 10/22/19, 10:19 PM
I also feel sharing an IP with many other users adds to the level of anonymity.
by hansdieter1337 on 10/23/19, 12:37 AM
Anonymity is actually pretty hard...
by peterwwillis on 10/23/19, 1:12 AM
by ru999gol on 10/23/19, 7:15 AM
And also what exactly would be their incentive in building up their infrastructure to facilitate this logging, do you have any idea how much storage space each VPN node in their network would need just to log everything?
And even if they were to log everything you are still sharing a IP with hundreds of other people making you less identifiable to at least the websites you are visiting.
100% FUD
by to-too-two on 10/22/19, 11:43 PM
by linsomniac on 10/23/19, 12:09 AM
by sarah180 on 10/23/19, 3:03 AM
by TomMckenny on 10/22/19, 11:32 PM
by readhn on 10/22/19, 11:33 PM
by Iv on 10/23/19, 3:50 AM
by badsavage on 10/23/19, 7:47 AM
by drdrey on 10/22/19, 9:39 PM
by sarim on 10/23/19, 7:22 AM
by jaimex2 on 10/23/19, 4:27 AM
by sidcool on 10/23/19, 5:05 AM
by _57jb on 10/23/19, 5:04 AM
Run....your....own....vpn
by rhacker on 10/22/19, 10:09 PM
by lugg on 10/22/19, 9:59 PM
Which I consider my ISP.. no, I can't just change ISP, I live under five eyes. I don't get a choice.
This article is rediculous. It's just a clickbait title and a whole bunch of ranting saying the exact opposite.
by diminoten on 10/22/19, 9:23 PM
Also, it's a terribly constructed article, genuinely terrible. Completely wrongly assumes a specific threat model that isn't accurate for the target audience.