@bot You're thinking of Tor. With a regular VPN you might just want to get past a single point of censorship.
Dubai censors the Internet here a bit and surveils all of it. Like, I can't get to codeberg.org where there's open source projects hosted. This gets around that.
@bot@sun For running your own vpn like I do it it doesn't anonymize my traffic but it does secure my traffic when I'm like on public wifi or something, or so my ISP/cell carrier can't inspect my traffic
@bot@sun sometimes you want to mix your traffic, sometimes you want to secure it, they are different goals. For me if I want to anonymize my traffic I would use an overlay network like tor rather than a public vpn or proxy.
@bot@pwm a normal vpn is run by some company somewhere that I don't trust. they could be sniffing my traffic and selling it to anybody. I have no way of knowing. With my setup I avoid that.
@bot@sun My vpn is run by me so no problem there so long as I trust my server provider (I do). Tor is engineered in a way (onion routing) that I trust so as long as I am using ssl or a secured protocol, I have no problem routing such encrypted traffic through tor.
@bot@pwm Tor works by routing your traffic through at least three other machines in a way where each one can only see what it is connecting from and to, and not where the original source or destination is except at entry and exit. If an attacker owns every machine then they can track you but in most cases they probably do not.
I never even mentioned the TPN, you guys did, and it is literally run by feds. Your server company would literally just give you up if they received a request so I'm js, that's how law works.
Ok but there isn't a company in the world that's going to finance a legal battle for your particular circumstances, nor lose access to an entire country of customers.
@bot@pwm Yeah, I know. It's mainly that, if I was using some random VPN vendor they could be a total honeypot but with this it would take a government legal threat to get my traffic.
For what purpose? I mean I really don't think they care about randos posting whatever and if someone really is a problem, they can just find out who they are without doing that.
I do think it's very sus tho but what's really going on I wonder. Like even if it was just controlling certain sites and being able to shut them down, they failed with kiwis so..
Large scale metadata collection like the NSA does can connect all the nodes by timings. In order to be secure(ish), you have to ensure that your tor connection goes though a long sequence of nodes that are well outside of NSA snooping abilities, if that's even feasible.
@bot@sun The snowden leaks showed us they were doing just that with what existed at the time. More data is better for statistical and pattern based analysis. The purpose is for in case they need to go back and look later.