I honestly don’t believe I will have any legal trouble because I don’t do anything like cp or worse, I just pirate media I like, not even porn. But across users of communities, or on public trackers, is IP exposure something to be concerned about?
I honestly don’t believe I will have any legal trouble because I don’t do anything like cp or worse, I just pirate media I like, not even porn. But across users of communities, or on public trackers, is IP exposure something to be concerned about?
I am selfhosting VPN for 2.49$ a month. Speed is up to 700 mbps in my case and I have additional services like PiHole + unbound.
If you’re “self hosting VPN” then both your ingress and outgoing VPN servers are showing THEIR I.P. address publicly, which is then tied back to you through DNS/Hosting services, so, Lucy, splain that to me
Simple: make friends with someone with high speed internet who’s not very savvy, keep up the charade until they allow you to borrow their computer. Then you install a headless vpn server with logging disabled. Boom, high speed local VPN that doesn’t point to you. Just buy them a $2.50 beer once a month to keep up pretenses in case you need to do maintenance.
lulz
To find out my real IP address, you need to contact a hosting provider that is registered in a country with laws that allow it not to cooperate with authorities.
If you’re self-hosting a VPN that you’re using for piracy, you’ll still have an unique IP associated with you, and your hosting provider knows that you’re using that IP. Doesn’t that defeat the purpose?
But if the server is located in a piracy-friendly country, doesn’t that solve the problem?
How on earth do you selfhost a VPN?? I’ve never heard of that
Self hosted VPNs are not suitable for sailing the seas. Self-hosting a VPN server only provides remote access to your local network. It does not provide any sort of privacy benefits, because the tunnel exit is an IP address traceable to you.
If they are paying for it, it’s either not self-hosted, or they are paving a licensing fee for the VPN software they are running locally.
Yes, very easy to create the VPN, but hard to hide your identity when your billing is attached to both ends.
Ah ok, that makes sense, thanks!
The majority of VPNs are self-hosted. The most common use cases for a VPN are things like connecting to an employer’s network when working from home, or connecting to your home server when away from home.
Commercial VPNs that route all your traffic through them aren’t the usual VPN use case. They’ve become common mostly because people don’t know how to use proxies, and they make it easy to ensure everything is routed via the VPN. A lot of use cases that people use VPNs for could really be solved with proxies.
TIL! Thanks!
You still need someone else’s computer. Making a cloudflare proxie or other cloud platform is useless and not secure, specially if you’re torrenting or trying to hide your IP.
I’m pratically sure they even block the torrent protocol and do not allow port forwarding on most cloud VPS.
Yeah proxies are great, but only if you have somewhere to route your traffic.
A proxy is no less secure than a VPN, assuming it’s using encryption like TLS. It’s not as good for torrents since you can’t port forward, but fundamentally people that use commercial VPNs are using then just like a proxy. Some providers like NordVPN do offer HTTPS proxies in addition to their VPN service.
A proxy operates on the application level; a VPN on the OS level. Both the VPN and the proxy are susceptible to OS-level threats. The proxy is also susceptible to application-level threats that the VPN is not. A misconfigured or exploited torrent client, for example, could ignore the proxy and expose your public IP. With a properly functioning VPN, that faulty application can only expose the public-facing end of the VPN tunnel.
A VPN can also have a faulty config. Everything depends on correct configs :)
You sure about that? I mean, to use a VPN your need some kind of application that could potentially be vulnerable or have some zero day exploits.
In contrary, a proxy is as simple as to forward your traffic to another computer through a SSH tunnel which doesn’t specially need some kind of application but only relies on lower level package.
Maybe I misunderstood your comment but If I’m wrong I’m agear to learn something new.