this post was submitted on 27 Sep 2023
191 points (98.5% liked)

Privacy

39971 readers
331 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
all 16 comments
sorted by: hot top controversial new old
[–] [email protected] 5 points 2 years ago

Oh man I've been looking for something like this, hell yeah

[–] [email protected] 1 points 2 years ago (1 children)

I usually have a VPN client running in a container and then attach the browser instance to the network namespace of the container.

[–] [email protected] 1 points 2 years ago (1 children)
[–] [email protected] 1 points 2 years ago (1 children)

Mmm do you know Linux containers? Like Docker containers, for example?

You need to understand Linux namespace and Linux containers to understand this trick. It isn't super advanced to be honest, just a Linux feature that is very useful.

It can be overwhelming if you haven't worked with containers before: https://youtu.be/fTcit7F5Bcg?si=rQlq0mJyapIpOlx8

Basically you can have multiple "network stacks" in the same machine, and they are isolated. By network stacks I mean things like the netfilter rules and the routing rules.

So, if you deploy a VPN inside a network namespace that isn't the host's namespace, the host won't route the traffic to the VPN by default. Only the processes that are attached to that network namespace will process the network packets with the netfilter and routing rules of that namespace. So, if you only attach the Firefox process to the network namespace of the VPN, only the traffic generated by that process will go through the tunnel.

[–] [email protected] 1 points 2 years ago

Here is an alternative Piped link(s):

https://youtu.be/fTcit7F5Bcg?si=rQlq0mJyapIpOlx8

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I'm open-source; check me out at GitHub.

[–] Asymptote -4 points 2 years ago (2 children)

Why not both? Both is cool. Some people don't trust VPNs. Some people don't trust Tor.

Using both means if someone wants to get at you they likely have to compromise both.

[–] [email protected] 12 points 2 years ago (2 children)
[–] [email protected] 3 points 2 years ago (1 children)

When randomly combining two things, it's usually more reasonable to assume you'll get the worst parts of both rather than the best. Especially when concerning safety, security, privacy, or other weakest link type endeavours.

[–] [email protected] 2 points 2 years ago

And that's the reason I linked this without downvoting.

[–] Asymptote 1 points 2 years ago (1 children)

This links onto an article that explains why it's sometimes a good idea.

[–] [email protected] 1 points 2 years ago* (last edited 2 years ago)

This links onto an article that explains why it's sometimes a good idea.

I wouldn't say that. It explains the pros and cons of different configurations (kind of), of tor, VPN and proxy.

Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy.

You can read/watch about how it screwed people that did it wrong.