Michael wrote:
> On Friday, 5 August 2022 21:45:25 BST Dale wrote:
>> Michael wrote:
>>> What kind of protection are you seeking - what is your threat model?
>> I'm mostly wanting it so people can't just look and see what I'm doing
>> or where I am, mostly my ISP.  
> In this case 'people' and your ISP will see you are connecting to the remote 
> VPN, but not what website you visit thereon.
>
> The website you visit will not see your real IP, but the exit IP of the VPN 
> node.  This may break some websites and streaming services who only allow 
> connections from specific jurisdictions.
>

That may be the case but if it is a problem I run into, I can adjust
settings if needed.  


>> I do a little torrenting and such too.
>> ;-)  That said, even if I go to my bank's website which is https, it
>> will also go through a VPN which also encrypts the traffic.  My bank is
>> secure as far as I know but having more protection added can't be a bad
>> thing. 
> All connections to banks are encrypted end-to-end for decades now and the 
> encryption has becoming stronger over the years.

That is likely true.  I still remember Snowden tho.  We don't know what
backdoors are in use even for bank encryption.  Thing is, open source
tools are harder to fall into that trap since everyone can see what the
code is.  If a backdoor is forced in, it will be known to a lot of
people and then that tool won't be used.  It's sort of funny in a way,
they more Govts and others try to restrict things, the more tools there
is to get around it.  From what I've read, most VPNs use open source
tools.  Most even use the current best and would upgrade if needed. 
That gives me some extra protection in the event my bank or any other
website falls behind on updating theirs. 

Basically, I don't trust Govt with much of anything.  If they say they
don't do something bad, you can pretty much bet they are doing exactly
that or even worse. 


>
>> I'm torn between torguard and surfshark.  I'm not sure where torguard is
>> located but surfshark is in the Netherlands I think.  Outside US
>> jurisdiction and from what I've read, they never give info to anyone
>> about their customers traffic.
> Yeah, that's what they all say - their business model depends on it.  State 
> sponsored actors are likely to know what the need to know anyway, with or 
> without the explicit VPN providers collaboration.  ;-)
>

May be the case but I plan to try anyway.  At least it won't be easy for
them. 

>> I'm still researching torguard.  Maybe
>> someone here knows where they are located???
> I understand they are a US based provider in Florida:
>
> Vpnetworks, LLC
> 618 E South St
> Orlando, FL 32801
>
>  but they have VPN servers all over the globe.  Some are virtual servers and 
> are NOT physically located in the countries they claim.  The fact it is 
> located in the USA it means the authorities can request client list 
> information.  VPN providers in jurisdictions like BVI, Panama, or even 
> Switzerland might stand a better chance.
>
> Anyway, this is a moot point.  If a VPN provider protects your traffic from 
> 'people', who protects your traffic from the ... VPN people?!  LOL!
>
> I don't use VPNs, but the interwebs are buzzing with reviews and suggestions. 
>  
> If torrenting is a requirement, then associated forums and mailing lists 
> would 
> provide advice on what works best for your use case.

Well, that settles that then.  I guess it will be Surfshark.  Pretty
sure it is in the Netherlands but may be wrong on country.  I just
recall it being outside US jurisdiction.  I also read they have been
audited by independent people to ensure they have no logs even if asked. 

Thanks for all the info.  Yours to Tastytea. 

Dale

:-)  :-) 

P. S.  Anyone need some used AT&T DSL modems?  I got a few. Some have
been updated with heat sinks on the chips which makes them run cooler. 
I got several Westel black ones and a couple smaller gray Motorola
ones.  I also have one that is a AT&T marked one.  They need a home. 
;-)  May start a new thread if no one replies here.  Kinda buried in
this thread.

Reply via email to