@sally@teto A VPN is often useless for privacy, as really VPNs log everything (even if the VPN host doesn't log, the datacenter and/or the NSA logs) and all your browsing is tied to a single VPN account that can be used to correlate all your internet activities.
If you want privacy, you want to use Tor Browser.
The main practical use of a VPN is to get away with unauthorized copying.
It won't protect you if you connected for the last decade using clear IP to a proprietary social media, they have everything logged, if feds see the IP is from a datacenter in Thailand but the guy is obviously a german citizen they'll just politely demand Facebook/Twatter/Jewgle for it.
The best course of action is first and foremost don't share opinions on a honeypot, don't have accounts bound to any real identifiable identity, and then you can go and get yourself a reputable VPN such as Mullvad to mask your fingerprint.
Same deal. If you post opinions from Facebook, Twatter or 4chan that you posted on for the last decade using your real IP it won't matter if you use a VPN.
@teto@sally >blind to how govs actually "get" you and arrest you. The glowers get you by deanonymizing you, which is trivial for a clearnet connection, harder for a VPN connection and very difficult for a tor connection.
>Tor browsers are too slow for daily use. Skill issue. Works on my machine.
>VPNs already make it too complicated for the police to find you. VPNs may make the police give up on finding you, but if they really want to find you, they will find you despite using a VPN.
>prove your case with an IRL raid that happened in Germany. Why would the glowers publicly announce their covert glowing activities?
@Suiseiseki Your extremism makes you blind to how govs actually "get" you and arrest you. Tor browsers are too slow for daily use. VPNs already make it too complicated for the police to find you. Just fucking believe it or prove your case with an IRL raid that happened in Germany. @sally
@Suiseiseki@teto@sally if the glowies want you they have other ways to get you- like project Bluebeam or w/e it was called. It was a thing on the PRISM leaks where they have the capacity to plant evidence on your PC with a remote connection.
@Marshall1Banana@teto@sally >where they have the capacity to plant evidence on your PC with a remote connection. Of course they would trivially have such capability if you run a proprietary OS with a built-in backdoor.
That's why you run 100% free software - can't use a backdoor if there isn't any.
There is only one free software cellphone OS; https://replicant.us/ unfortunately that can't do anything about the proprietary malware that runs on every single mobile chipset.
@gabi@sally@teto >You should also disable JavaScript, do not load custom fonts, enable tracking protection, isolate requests to first-party domains, spoof referers, and block third-party requests. Make sure Geolocation and WebGL are disabled. Yes, that's what safest mode does - manually setting those things would make you uniquely identifiable.
You need to also set javascript.enabled=false in about:config, otherwise JavaScript sometimes still gets run.
>HTML and CSS can still be exploited in browser-targeted attacks. As far as I can tell, all of such attacks have needed to leverage JavaScript, as it's too difficult to convince the user to follow the exact sequence of steps required to trigger the attack otherwise.
@Suiseiseki@sally@teto >If you want privacy, you want to use Tor Browser You should also disable JavaScript, do not load custom fonts, enable tracking protection, isolate requests to first-party domains, spoof referers, and block third-party requests. Make sure Geolocation and WebGL are disabled.
Remember that the WWW is extremely vulnerable. Even CSS can pose a risk. Disabling JavaScript removes many threats, but HTML and CSS can still be exploited in browser-targeted attacks.
@yomiel@teto@sally >Like Tor is too slow for daily use. Tor Browser will be too slow if all you do is run proprietary slop JavaScript, but decent webpages will load just fine.
There are certain cases where the performance of a guard degrades to worse than dial up, but improvements have been made to that and you can just temporarily change to a bridge.
>obviously no point of using it for internet banking The bank has no business in knowing where you're connecting from, thus there is a point in using it - alas many banks will go lock the account if you try to access it via tor.
In the age of NSA spying, all browsing should really be done via tor.
>Even watching video is pretty reasonable It's perfectly reasonably to download a 1080p video via tor and watch it later.
@sally@teto@Suiseiseki It's funny to hear people repeat stuff the just heard online. Like Tor is too slow for daily use. It's peak Dunning Kruger, they watch one video on Tor that explains it's basic functions, then the video maker will slander it (often accidentally) by calling it slow.
In reality, Tor is good for any task that's either non-personal (obviously no point of using it for internet banking). Even watching video is pretty reasonable under Tor at low resolutions (< =720p).
Tor is reasonably fast nowadays, specially if you don't touch exit nodes which you really shouldn't in the first place, I2P is the slow side of darknet.
@sally@teto >you connected for the last decade using clear IP to a proprietary social media a lot of people forget this, switching to a VPN won't automatically give you privacy. You have to delete old account and make new ones anonymously.
Surprisingly easy, though. Many even proprietary online stores have methods of buying truly anonymously. For example, Steam, you can use a gift card to buy games with. Amazon, you can deliver to a Amazon locker and purchase with gift cards. eBay has gift cards too.
Emails can be created without any phone number or verification too.
@yomiel@teto@sally >You have to delete old account and make new ones anonymously. The issue with doing that is if you ever log into the account with the VPN off, you've just burned any privacy.
Meanwhile, you can't accidentally turn off tor in Tor Browser.
>you can deliver to a Amazon locker and purchase with gift cards Don't the lockers have spy cameras?
>Emails can be created without any phone number or verification too. That's actually now pretty rare - the only place that I know of that currently offers mail accounts to tor users with no phone number or other verification is pissmail.
@teto also install Linux with full disk encryption Every normie tier distro has this option in the installer What good is seizing laptops when the drives are useless without your password?
@teto reading that thread and >I use nordvpn Lol. nordvpn would give logs to the feds if they asked for it. mullvad has been proven that they don't keep logs. they got raided by the feds and found nothing
@CapitalB server? We are talking about posting "hate speech" on social medias. If you're not on "the right side of fedi" they will get your address with a single email. They could technically find you by just checking urls in your history at the ISP too