You do know you can setup your own VPN right? It's not that hard. Purchase VPS in some foreign country, setup VPN, connect to VPN, done.
Helps if you use Linux too.
It's not that hard. Purchase VPS in some foreign country, setup VPN, connect to VPN, done.
Congrats, you now have a single exit node with a static IP which ties directly to your identify.
I'm not sure what you think that accomplishes compared to simple https from your home IP.
It's possible to purchase VPS's with crypto anonymously.
That's a rare feature among VPS providers. But a very common feature among VPN providers.
With a VPS, that still leaves you with a single static IP. Which is uniquely yours. Which is trackable. Which ties directly to your VPS account. Which the VPS provider can tie to your home IP. And which they will, under the slightest pressure. Because VPS providers are not in the business of selling privacy. So can sell out a problematic user with no damage to their reputation.
There is not a single advantage to using VPS this way, compared to a VPN. You only lose features and benefits. You gain nothing. Even compared to not using anything, the benefits are marginal at best.
I'm guessing you got this advice from a gist that keeps getting passed around. It's terrible advice and the guy who wrote it is an idiot.
The VPS provider has access to your system. Similar problem. If law enforcement comes knocking, they'll be given access to your server. Now they have access to all your traffic because the VPS provider has your traffic logged, and now LE has your private keys.
It's a far better option than just buying a VPN subscription, but it's far from secure.
The VPS provider would only see traffic going outbound, not the contents of said traffic, I don't see how they could read the traffic if the packets are encrypted. If you also encrypt the volume and disable pw login and rely solely on pk SSH to authenticate, there is no way even for the hypervisor console to even get into your system, best they can do is reboot from the Hypervisor or nuke it. You can also purge your own logs on the VPS.
You can make it extremely difficult for them and not worth their time. There is no 100% secure system, but we can get pretty close.
The packets are encrypted. LE can get your VPN encryption keys from the VPS.
Hence, they can decrypt the captured encrypted traffic. Definitely smarts to encrypt the drives separately, and disabling pw login.
It all depends on who you've pissed off. If you've got a nation-state power like the CIA after you, there's basically nothing you can do to protect yourself, short of going fully off-grid.
(post is archived)