Sorry, fired that off before I replied.      :)

> On 23 Dec 2016, at 9:43 am, Christian Heinrich 
> <[email protected]> wrote:
> 
> 
> On Thu, Dec 22, 2016 at 5:48 PM, Jim Birch <[email protected]> wrote:
>> The biggest user segment in Australia are people who want to access the
>> more extensive content on US Netflix, but there are other people who want
>> to hide their connections for various reasons.  In terms of metadata
>> collected by the Australian government, this should show a single encrypted
>> connection to single overseas ip address (which they may know as a vpn
>> provider) but not all the stuff you browse or access.
> 
> This is the core issue, their offering is for geolocation rather than privacy.
> 

I won’t go into the specific technicalities … BUT:

1. Establishing a connection between a server in Kazakhstan and a user in 
Australia, and

2. Repackaging the original HTTPS data packets, including the packet headers, 
and bundling them into new packets in a real time encrypted data stream, which 
are decryoted at the othe rend, have different IP and other packet header 
information assigned to make the requests/conduct the session

… does a heap to ensure a private connection.

The server at the other end takes over the TCP/IP application requests or data 
receipt (and remember TCP/IP is a stateless protocol … simply opening and 
closing connections to pass data) and repackages the results of same for 
transmission back to the user

And if you factor in ’double hop’ or even ‘triple hop’ VPN services …. where 
the connection is handled by two or three remote servers sequentially … and I 
can point you at any number of VPN services and servers that offer this extra 
level of security/tunnelling/concealment … you can factor in even grater levels 
of privacy.

The point is that the VPN server removes the initial IP address and origin 
identifying information as it reconstructs the packets so that it is 
effectively the client for the transaction, and then passes the network results 
back to the user at the other end of the data socket. And if that’s not 
concealing identity … then what is?

Just my 2 cents worth ...
_______________________________________________
Link mailing list
[email protected]
http://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to