Introduction
8 days ago I made this post asking for the most controversial privacy topics. My first post answering a controversial question got so few upvotes that it was almost my worst post to date. I don’t do these for upvotes, though. I do them for fun :)
So, with that, here is the second post demystifying some controversial privacy topics. @TranquilTurbulence@lemmy.zip asked “VPN: essential or snake oil?”
I try to avoid topics that have been thoroughly answered multiple times, or has such a direct answer that it would be too short to make a post about. This topic is a bit of both, but worth writing anyway, because I do have my own insights.
Some people didn’t like that I break the main question down into multiple sub questions. It is valid criticism, but it’s my style of writing, so I will stick to what I’m good at.
What does a VPN do?
A Virtual Private Network (abbreviated “VPN”) is a way of proxying your internet traffic through a third party. There are many reasons why you would want this:
Hiding your IP address: VPNs will replace your IP address with a random IP address assigned by the VPN provider. IP addresses are unique to your router, meaning you can be uniquely identified. IP addresses are usually static, meaning it never changes, but sometimes your ISP may assign you a dynamic IP address, which will change every few months or so. If you open up ports on your router (for various purposes), it can leave your network vulnerable to certain attacks as long as the attackers know your public IP address.
Hiding your location: Your IP address can narrow your location down to the city you live in. In some cases, such as shared Wi-Fi (like on a college campus) or public Wi-Fi, the IP address can be more easily identified to the specific block or building you are in. Any internet connection made can see your IP address, and can automatically use that to attempt to locate you.
Encrypting your traffic: VPNs can allow your traffic to be encrypted, so that your ISP or other people connected to the same network can’t see which sites you visit or (in some cases) what data is sent. The reasons why this is important are too long to list, but you can work it out on your own.
Network based ad blocking: Some VPN providers allow you to block ads before they even reach your device, which can increase your loading times and save you data on metered connections. This can be achieved without a VPN through your own DNS filters, but it is a feature of VPNs too.
Access blocked content: VPNs can be used as a way to bypass censorship if your network regulates your traffic (such as at an office or school). A VPN can bypass these restrictions, allowing you to access content freely.
Accessing region-specific content: Content on streaming services such as Netflix, video sharing sites such as YouTube, or many other services may restrict what content is available to you based on your country. A VPN can allow you to bypass these restrictions in some cases.
Those can all be ways to enhance your privacy, security, anonymity, and freedom while browsing the internet. VPNs do come with some downsides, though.
What are the downsides of using a VPN?
When you browse the internet without a VPN, you are placing your trust in your ISP or cellular provider to uphold your privacy, and placing trust in the network devices such as your router to uphold your security. In practice, that is almost never the case. Using a VPN doesn’t automatically make it more trustworthy, but it does place that trust in the hands of your VPN provider instead. Some VPN providers are more trustworthy than others, but there are good options to choose from. You still have to trust an entity to uphold your privacy and security, but VPNs can be a much better place to keep that trust.
Not everyone may want to use a VPN though. Besides distrust, VPNs have other downsides. VPNs will slow down your internet speeds, may block certain functions such as torrenting, and may incriminate you in some countries. Ultimately, the choice to use a VPN is yours.
If you believe the upsides outweigh the downsides, then a VPN is a good tool to have. If your threat model requires anything a VPN provides, it’s an essential tool. Some functions of a VPN can be achieved through careful setup of a DNS and elite anonymity proxy, but VPNs will always be the easiest option.
Which VPN providers are the best?
There are currently 3 top VPN providers for privacy. All of them are open source, and all of them have their pros and cons. I haven’t listed every feature for each, but here are the notable differences:
Proton VPN
Proton VPN provides a free tier VPN with some functionality limited, as well as a premium tier if you have a Proton subscription. If you already have a Proton subscription already, and don’t mind putting all your eggs in one basket, Proton VPN is a good option.
Mullvad VPN
Mullvad VPN is probably the most private VPN available. It is only paid, but it allows you to pay any way you want, including cash and cryptocurrencies. No signup is required, because you are given a randomly generated account number for payment. You can regenerate the number at any time.
IVPN
IVPN is unique and relatively unknown. The main benefit I see is that it is the only VPN of these three that is available on Accrescent for Android, allowing you to have extra confidence in the integrity of the app. Eventually Mullvad VPN and Proton VPN will be available on Accrescent.
These VPNs will uphold your privacy and security, and won’t log your internet traffic. VPNs in the past have been used to aide law enforcement by handing over those logs, so it is good that these don’t.
Conclusion
VPNs can be an essential tool if you need them, and there are options that respect your privacy. Always be aware of the risks, no matter how trustworthy a VPN provider may be. Thank you for reading!
- The 8232 Project
narc0tic_bird ( @narc0tic_bird@lemm.ee ) 12•4 months agoAccessing region-specific content doesn’t work as well as it once did with some services actively blocking access from public VPN services nowadays.
Windscribe has a plan where you can pay for an IP address dedicated to you, but this takes away the advantages a shared IP may have.
sp3ctr4l ( @sp3tr4l@lemmy.zip ) English11•4 months agoProton VPN is no log…
But they have and will turn over your real IP address from your ProtonMail account if legally ordered to.
unbuckled ( @unbuckled@lemm.ee ) 18•4 months agoAs would any company. They are bound by their local laws.
Lime Buzz (fae/she) ( @SweetCitrusBuzz@beehaw.org ) English5•4 months agoWhich is why it’s better they do everything to not have that data or at least not have it accessible. Proton could be doing a lot more to make the information not avaliable to them.
sp3ctr4l ( @sp3tr4l@lemmy.zip ) English2•4 months agoYeah.
OP suggests the ease of use for just using ProtonMail and ProtonVPN all bundled together.
Maybe don’t do that. Maybe use Proton VPN, but find a seperate and/or more secure email provider.
Tuta, Mailfence, StartMail are all comparably secure compared to ProtonMail.
Posteo is possibly more secure/safe from a legal subpoena in that they claim to not log IPs, and they claim they anonymize your account from your payment method… though I have not researched it enough to personally say yes they do this and it actually works to prevent the legal info request situation.
EDIT: Also, just to throw this in, another weird thing about IVPN is that they are actually legally based in Gibraltar, which puts it in a fairly weird legal situation where it does not appear to be totally clear how a legal request for data from them would actually be processed.
Lime Buzz (fae/she) ( @SweetCitrusBuzz@beehaw.org ) English2•4 months agoThe real problem is email is not a private communication medium or at least not easily
We hope some day that something like darkmail will actually be a reality, until it is we recommend folks not use it as much as possible,
Though for when that is necessary a more private and secure email provider is a worthwhile thing to use, as much as anything like it can exist.
unbuckled ( @unbuckled@lemm.ee ) 2•4 months agoWhat are some of the things they should make inaccessible to themselves?
ReversalHatchery ( @ReversalHatchery@beehaw.org ) English2•4 months agosolution: use their tor hidden service instead. It’s for exactly that
Churbleyimyam ( @Churbleyimyam@lemm.ee ) 5•4 months agoIf it wasn’t for the fact that in the UK internet connections are logged I probably wouldn’t bother with a VPN.
It really annoys me that a government choice is forcing me to be wasteful.
rcbrk ( @rcbrk@lemmy.ml ) English4•4 months agoThe article does not explain the primary design purpose of a VPN – providing an encrypted tunnel into or between two private subnets.
For example, your home subnet is typically all 192.168.nnn.nnn addresses – a class of addresses which the wider internet does not route, and which your router/modem does not allow the wider internet to access unless explicitly permitted.
Say you have a NAS on your home network, and you want to access it from your laptop while at a cafe; you could set up a VPN between your laptop and your home router, and it can make your home network appear as your local network to your laptop, giving you access to your NAS.
Or between two office locations of a business – their database servers, accounting systems, printers, etc can all be freely accessible between offices without being exposed to the wider internet.
Abnorc ( @Abnorc@lemm.ee ) 1•4 months agoDo services such as Mullvad let you do this somehow?
tavu ( @tavu@sopuli.xyz ) 4•4 months agoMost mass-marketed VPN services (the type marketed for accessing the internet) allow you to VPN into their private subnet where the thing you can access is their gateway router (which you use in place of your home gateway router/modem for connecting to the internet). You don’t need a VPN service to use VPN software between two points you control.
chaos ( @chaos@beehaw.org ) 2•4 months agoA VPN is just a way to say “wrap up my normal internet packets and ship them somewhere specific before they continue the normal way.” The normal way is you want to get a message to some other server, and as a part of setting up the network you’re on, your machine should already have a list of other devices it’s physically connected to (“physically” could be “via radio waves” so not just wired) and they should have already advertised “hey, I’ve got access to these places too” for your information. Your router is likely the only one in your home network advertising anything that is on the larger internet, so all your outgoing messages will have to go that way to get to their destination. For example, I’ve got a phone, a wifi access point, a router, and my ISP’s box; my phone knows the WiFi access point is two hops away from internet because the access point said so, that’s the best one it can see, so it sends it that way and hopes it makes it. Each machine in between does the same thing until hopefully it gets where it is supposed to.
With a VPN, the same messages are wrapped in a second message that is addressed to the other end of the VPN. When it gets to the VPN provider, it’s unwrapped, then the inside message is sent off to wherever it’s supposed to go. If a message comes back to the VPN provider addressed to you (ish, this is simplifying a bit), it’s wrapped up the same way and sent back to you.
Big companies often put resources “behind” the VPN, so you can’t send messages from the outside addresses to the office printer, they’ll get blocked, but you can request a connection to the VPN, and messages that come in through that path do get allowed. The VPN can be one central place where you make sure everything coming in is allowed, then on the other side the security can be a little less tight.
VPNs also encrypt the internal message as a part of wrapping them up, which means that if you’re torrenting via a VPN, all anyone else can see is a message addressed to your VPN provider and then an encrypted message inside. And anyone you were exchanging messages with only ever saw traffic to and from the VPN provider, they never saw where it was going after your VPN provider got it. Only you and the VPN provider know what was happening on both ends, and hopefully they don’t look too closely or keep records.
Hopefully now it’s clear that Mullvad and similar won’t help you access your own things from outside, they’re only good for routing your stuff through them and then out into the rest of the internet. However, this isn’t secret magic tech: you can run your own VPN that goes in the other direction, allowing you into your own home network and then able to connect to things as if you were physically there. Tailscale is probably the easiest thing for things like that nowadays, it’ll set up a whole system where your devices can find each other and set up a mesh of secure, direct connections no matter where they are physically located. By default, just the direct device-to-device connections are re-routed, but you can also make a device an “exit node” that can route all your traffic like a traditional VPN.
Of course, that will be the exact opposite of what you want for privacy while torrenting, as it’s all devices that you clearly own and not hiding their identities whatsoever. But it’s very cool for home networking and self-hosting stuff.
hackerwacker ( @hackerwacker@lemmy.ml ) 4•4 months agoIf you attract the attention of the authorities and you use a residential connection with multiple users, they will have a difficult time conclusively establishing who did what.
If you use a VPN it’s likely to be a lot easier (single user, paid with personal card, etc) and it looks like you’re trying to hide so the penalty may be higher.
ERROR: Earth.exe has crashed ( @IDKWhatUsernametoPutHereLolol@lemmy.dbzer0.com ) English1•4 months agoEh. IPv6 might make individual devices unique. I mean I’m no expert in how IP addresses work. But it used to be every device on a network share a IPv4 address, but with IPv6, every device now has a different IP.
TranquilTurbulence ( @TranquilTurbulence@lemmy.zip ) 2•4 months agoThanks. That was a good summary, and I appreciate that you brought up threat models.
People should think about what kinds of threats are worth their time and money. If that list of threats contains something where a VPN can help, you should totally consider getting a VPN. If your threat model doesn’t include things like that, VPN might not be the solution you’re looking for.
Brining up trust was another good point. People should think about how much they trust their ISP or some VPN company. Obviously, you can’t trust every VPN company out there, but where you draw the line is closely connected to your threat model. For example, if you are a journalist in dangerous country, picking the right company is a matter of life and death. If you are in a safer environment, your threat model is probably very chill by comparison, so you might be fine with some less secure options.
fmstrat ( @fmstrat@lemmy.nowsci.com ) English1•4 months agoOpinion: Your low up-vote counts are due to post length. Post these in a blog, bullet key points on Lemmy with a link. Watch up-votes soar.