this post was submitted on 23 Jun 2023
21 points (95.7% liked)

Privacy Guides

16270 readers
4 users here now

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more...


Check out our website at privacyguides.org before asking your questions here. We've tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the "official" Privacy Guides community on Lemmy, which can be verified here. Other "Privacy Guides" communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don't ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don't repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don't abuse our community's willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

founded 1 year ago
MODERATORS
 

Came across this controversial link where someone says that a VPS would be more secure than a VPN provider. From my understanding:

-Wouldn't the VPS provider just see everything instead of a VPN provider? -Wouldn't fingerprinting be straightforward, even if you use a hardened browser, since you have a single IP traceable directly to only one user?

ytcombinator doesn't seem to take it seriously but I'm curious to hear what you all think about it.

top 10 comments
sorted by: hot top controversial new old
[–] dukethorion 8 points 1 year ago

A VPS might be more secure, if you know what you're doing. I use a VPS as a VPN to keep my ISP out of my traffic. Privacy is out the window though, because I have a static IP.

[–] [email protected] 6 points 1 year ago (1 children)

I would argue a VPS is less secure than a trusted provider. Of course, the definition of what's trustworthy is up to each person. The reason I say it's less secure is for 2 reasons:

  1. As you stated, the VPS provider sees everything. They also have direct access to the box themselves. Trusting them is just the same as asking to trust a VPN provider, the only difference being that a VPS provider will ask for personal information where a good VPN provider won't (i.e. Mullvad)
  2. You're a part of the security of the device. If you're not 100% familiar with exactly what you're doing to secure the VPS, you're likely exposing yourself in some way to bad actors. I also say you're "part" of it because you also have the dependency of the VPS provider being secure so someone can't compromise your machine.

The belief that a VPN provider doesn't help privacy is a myth. But it's true that you can't depend on the VPN being your only solution to privacy. There are more steps you must take beyond just a VPN, but it's definitely a required step if you want to be truly private. As an analogy: if people said "drinking water won't make you healthy" that's not true... But it's also only a part of what you need to be healthy and the statement's only true if you ignore the other things you need.

Further on the privacy front for my personal opinion: I don't think there's a such thing as a trustworthy ISP with personal data since they definitely track everything you access and probably sell that data, but there are a few trustworthy VPNs who likely don't do this. I'd rather take the risk in a VPN provider that is probably not doing what ISPs do, also allowing me to further enhance my anonymity online.

For me, I've been using Mullvad for about maybe 5 years now, along with a ton of other things I've setup for privacy. Haven't seen a targeted ad in nearly that amount of time, websites always think I'm located somewhere else, and any data breaches I've been a part of where IP addresses are in the data are of no concern to me.

Be sure to also look into geo tracking. If the device you're using is wireless, chances are Google and such can get your exact location if you're exposing your browser or software to geo tracking on the web, or if you don't spoof your Mac addresses. How they do this: the Google maps vehicle that drives around collects the locations of wireless devices and their Mac addresses, so that when you have geo enabled, they can pinpoint you down to a very close lat/long coordinate.

[–] [email protected] 5 points 1 year ago* (last edited 1 year ago)

This is my personal takeaway as well. The article seems to insinuate that because VPNs by themselves don't do anything meaningful for privacy, they're useless. It seems defeatist, since one could take measures to mitigate fingerprinting. But like you said they're only one of the important parts of maintaining privacy.

I am not more technically proficient than the average user. I have little experience in hosting anything, let alone hosting something that will tunnel all of my internet usage. I'd rather put my faith in my current provider to take the proper precautions and put more effort into things I feel comfortable with. It seems better to me than trusting an unknown VPS provider, my own skill and/or my awful ISP.

[–] [email protected] 5 points 1 year ago

If you don't add any CA certificates to your system, use HTTPS-only mode and connect from your own client, there's no easy way for them to see what you do on websites. They can only see what websites you're visiting, packets and the timestamp. Using VPS will be the literally the same, except you have only one server and only you are using it, so you're more fingerprintable.

Depends on your use case, for maximum online privacy you should use Tor Browser on Linux or TailsOS. If you want just to pirate, VPN is usually enough.

[–] [email protected] 3 points 1 year ago

I think both protect from different threat vectors.

A VPN provider can anonymize you but you have to trust them to not use the backchannel in any way (and of course to not actually log everything you do).

Hosting your own VPN isn't anonymous anymore, since the final connection still leads back to you. But it can properly shield you from untrusted public networks and you can be sure, that you are private, since you are in your own network then.

[–] Cybermass 2 points 1 year ago* (last edited 1 year ago)

I'm gonna preface this by saying I do work in networking as a job but I'm not an expert.

Neither are very secure to be honest. VPN adds a layer of security because of the dynamic IP connection points but a VPS can be used as an extra layer of security also.

In an ideal world if you wanted to browse the web with maximum security you would use the web browser of choice in a virtual machine, encrypt and then route the data to the server hosting the VPS on a different network (I would personally just put the computer and the server on the same network and seperate them with VLAN IDs) then I would run the data through a virtual firewall and then into the VPS then connect that to a VPN server. I would also install a bunch of network monitoring programs on the server hosting the VPS.

This is also completely overkill unless you plan on doing some really illegal shit like trying to hack into government websites or something. I wouldn't recommend that though haha

load more comments
view more: next ›