WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

998

Pretty obvious. The internet service providers will eventually block traffic to IP’s that host stuff that doesn’t fit the narrative.

Tor network is still using ISP’s

We all jumping to some potato MESH network?

What do we do when the ((media)) owned ISP block sites at the IP level? How do we make our own network?

Pretty obvious. The internet service providers will eventually block traffic to IP’s that host stuff that doesn’t fit the narrative. Tor network is still using ISP’s We all jumping to some potato MESH network? What do we do when the ((media)) owned ISP block sites at the IP level? How do we make our own network?

(post is archived)

[–] 6 pts

hell no they will not. VPN's are licensed businesses which are often either required to keep track of VPN logs, or can be legally compelled to turn over identifiable information about a VPN users traffic.

VPN's are one of the least secure ways of concealing your internet history, because you are trusting that the VPN provider is an angel who would rather go to jail than give up traffic logs for some randos they've never met.

[–] [deleted] 4 pts

You do know you can setup your own VPN right? It's not that hard. Purchase VPS in some foreign country, setup VPN, connect to VPN, done.

Helps if you use Linux too.

[–] 3 pts

It's not that hard. Purchase VPS in some foreign country, setup VPN, connect to VPN, done.

Congrats, you now have a single exit node with a static IP which ties directly to your identify.

I'm not sure what you think that accomplishes compared to simple https from your home IP.

It's possible to purchase VPS's with crypto anonymously.

[–] 0 pt

The VPS provider has access to your system. Similar problem. If law enforcement comes knocking, they'll be given access to your server. Now they have access to all your traffic because the VPS provider has your traffic logged, and now LE has your private keys.

It's a far better option than just buying a VPN subscription, but it's far from secure.

[–] [deleted] 2 pts

The VPS provider would only see traffic going outbound, not the contents of said traffic, I don't see how they could read the traffic if the packets are encrypted. If you also encrypt the volume and disable pw login and rely solely on pk SSH to authenticate, there is no way even for the hypervisor console to even get into your system, best they can do is reboot from the Hypervisor or nuke it. You can also purge your own logs on the VPS.

You can make it extremely difficult for them and not worth their time. There is no 100% secure system, but we can get pretty close.

[–] [deleted] 3 pts

Dont use a vpn based in the usa.

[–] 0 pt

Obviously.

[–] 1 pt

China. Biden says they're good people very trustworthy.

[–] 1 pt

That's because you're a noob. Professionnals use VPN based in country that don't require them to track logs and turn over their shit. I think Avast's VPN does.

[–] 2 pts

Avast

lol did you just recommend a chinese owned company as a good VPN provider?

[–] 0 pt

Then some sort of other encryption. The fundamental of not letting the ISP see what you are transacting works. ISPs route VPN traffic for businesses all day long without any idea of the contents.