this post was submitted on 07 Mar 2024
44 points (92.3% liked)
Privacy
39971 readers
331 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Actually this technique would be a lot more useful using a VPN due to correlation attacks.
You dont run your own VPN server. You use a company with thousands of customers. That's the point.
Doesn't change much for a correlation attack though if you already suspect a small subset of endpoints.
It helps a lot. Someone would need to go through the effort of tracking your VPN service and correlating that to you.
OP seems to worry about their ISP, and their ISP can't see anything at the VPN, so they'd need to go out of their way to gather that info. So as long as OP trusts the VPN, they're probably fine from everyone but state actors and well funded private investigators.
If you want to go beyond that, Tor is your next option. That should be effective against all but the most determined state actors.
As I mentioned I have a server, and I use a VPN to connect always to it. This makes using a paid VPN a bit harder. The dedicated VPN IP should fix this issue but I haven't looked into how difficult that'd be.
Yup. Tailscale+Mullvad isn't a bad option, but I'd rather not depend on tailscale and a true local connection will always be better. But then you have to pay through tailscale and then more identifiable.
So are you worried about your server's ISP? If so, you could run your own VPN on your server so your traffic to your server would be protected.
That wouldn't protect outgoing traffic, which may be what you're concerned about (i.e. if you're using your server as a SOCKS proxy or something).