Well there’s one very important thing a VPN can help you with.
If your ISP doesn’t want you downloading… uh… Linux ISOs, yeah, Linux ISOs, then you can use them to download all the Linux ISOs you want with BitTorrent and not get in trouble with your ISP.
Damn, I hate when I receive a letter from my ISP because I downloaded a Linux distro.
You joke, but I’m 100% sure it has happened at least once before.
I got a “warning” from my isp because i installed a VM on my pc.
I wonder if I’ll get a letter some day, for downloading Linux Mint. Though torrenting itself is perfectly legal here, the important part is the content that’s being torrented
It actually happened to me many moons ago. The Canadian ISP in question sent me an email saying that torrenting was “of disputed legality”(or something) and that someone in my house had torrented Ubuntu! I wish I still had the email but this was mid/late 2000’s.
Arrrticle
I’m done with paying for a virtual private network, a service that claims to protect your privacy when you’re connected to a public Wi-Fi network at the local coffee shop, the airport or a hotel.
For more than a decade, security experts have recommended using a VPN to shield your internet traffic from bad actors who are trying to snoop on you. But just as tech gadgets become outdated over time, so does some tech advice.
The reality is that web security has improved so much in the last few years that VPN services, which charge monthly subscription fees that cost as much as Netflix, offer superfluous protection for most people concerned about privacy, some security researchers said.
Many of the most popular VPN services are now also less trustworthy than in the past because they have been bought by larger companies with shady track records. That’s a deal-breaker when it comes to using a VPN service, which intercepts our internet traffic. If you can’t trust a product that claims to protect your privacy, what good is it?
“Trusting these people is really critical,” Matthew Green, a computer scientist who studies encryption, said about VPN providers. “There’s no good way to know what they’re doing with your data, which they have huge amounts of control over.”
I learned this the hard way. For several years, I subscribed to a popular VPN service called Private Internet Access. In 2019, I saw the news that the service had been acquired by Kape Technologies, a security firm in London. Kape was previously called Crossrider, a company that was named in a research paper by the University of California and Google as being part of an ecosystem of businesses using so-called ad injection technology that could behave maliciously. I immediately canceled my subscription.
In the last five years, Kape has also bought several other popular VPN services, including CyberGhost VPN, Zenmate and, just last month, ExpressVPN in a $936 million deal. This year, Kape additionally bought a group of VPN review sites that give top ratings to the VPN services it owns.
A Kape spokeswoman said that Crossrider, which has long been shut down, was a development platform that was misused by those who distributed malware. She said Kape’s VPN review sites maintained their independent editorial standards.
“It kind of sets a concerning precedent from the consumer standpoint,” said Sven Taylor, the founder of the tech blog Restore Privacy. “As the average user goes online to look for information about the product, do they know that what they’re reading might have been written by the company that owns the end product?”
A caveat: VPNs are still great for some applications, such as in authoritarian countries where citizens use the technology to make it look as if they are using the internet in other locations. That helps give them access to web content they cannot normally see. But as a mainstream privacy tool, it’s no longer an ideal solution.
This sent me down a rabbit hole of seeking alternatives to paying for a VPN. I ended up using some web tools to create my own private network for free, which wasn’t easy. But I also learned that many casual users may not even need a VPN anymore.
Here’s what you need to know.
What Has Changed About VPNs Not long ago, many websites lacked security mechanisms to prevent bad actors from eavesdropping on what people were doing when browsing their sites, which opened doors to their data being hijacked. This helped VPN services become a must-have security product. VPN providers offered to help cloak people’s browsing information by creating an encrypted tunnel on their servers, through which all your web traffic passes.
But in the last five years, the internet has undergone immense change. Many privacy advocates and tech companies pushed for website creators to rewrite their sites to support HTTPS, a security protocol that encrypts traffic and solves most of the aforementioned problems.
You’ve probably noticed the padlock symbol on your web browser. A locked padlock indicates a site is using HTTPS; an unlocked one means it’s not and is therefore more susceptible to attack. These days, it’s rare to stumble upon a site with an unlocked padlock — 95 percent of the top 1,000 websites are now encrypted with HTTPS, according to W3Techs, a site that compiles data on web technologies.
This means that VPNs are no longer an essential tool when most people browse the web on a public Wi-Fi network, said Dan Guido, the chief executive of Trail of Bits, a cybersecurity firm.
“It’s very difficult to find cases where people were harmed by signing on to the airport, coffee shop or hotel Wi-Fi,” he said. These days, he added, the people who benefit from a VPN are those working in high-risk fields and who might be targets, like journalists who correspond with sensitive sources and business executives carrying trade secrets while traveling abroad.
Simple Alternatives So what to do? Fortunately, most of us can secure ourselves online with basic protections that, unlike VPN services, are free, Mr. Guido said.
Importantly, people should keep the software on their devices and web browsers up to date because new software updates include security protections against the latest vulnerabilities, he said.
Another crucial step is setting up online accounts with two-step verification, which requires two forms of verification of your identity before letting you log in. That safeguard can help prevent attackers from gaining access to your data if they obtain your passwords.
For those who would still prefer not to browse the web on a public Wi-Fi network, there’s an easy solution included on most smartphones. The personal hot spot, a feature for wirelessly sharing a smartphone’s cellular data connection with other devices, like your computer, can be activated in the phone’s settings. Many phone plans don’t charge extra to use this feature, though hotspotting does count against the monthly data allotment in your cellular plan.
How to Create Your Own VPN Some people (including myself) still benefit from using a VPN, and not all providers are bad.
Wirecutter, a New York Times publication that tests products, recommends a few that are still trustworthy. But if your next VPN gets bought by a larger company, you may have to vet its trustworthiness all over again. I’m tired of the whiplash, so I created my own private network service.
I turned to Algo VPN, a free tool developed by Mr. Guido that automatically builds a VPN service in the cloud, which shields my browsing activity by allowing me to create a virtual tunnel on an outside server for my internet traffic to pass through.
Following the instructions listed on the Algo VPN project website, I set up a cloud service where my VPN service would be located on Amazon’s web services, a reputable and widely trusted cloud provider. The rest of the steps involved installing some scripts on my computer and typing in commands to generate my VPN.
After about an hour, I set up a VPN that worked flawlessly. The best part? Not only is it free to use, but I no longer have to worry about trust, because the operator of the technology is me.
Lmao, people are just adopting HTTPS in the last 5 years? This article is trash.
[…] I set up a cloud service where my VPN service would be located on Amazon’s web services, a reputable and widely trusted cloud provider. […] After about an hour, I set up a VPN that worked flawlessly. The best part? Not only is it free to use […]
Sorry, what? Last time I checked AWS VPSs were very much NOT free to use, and I’m pretty sure the lowest tier is still more expensive than your average VPN.
Also, this article seems to be arguing against its own points: “you probably don’t need a VPN, but I have one anyway”…
It has a free tier, for 12 months you can run one t3.micro for free. That’s more than enough for a single user VPN. Afterwards it costs like $9 a month for on-demand instances (in the EU, it’s cheaper in the US), at that point you can either switch to reserved instances (which brings the cost down to around $3 or create a new AWS account to enjoy the free tier again.
My guess is they’re using an AWS free tier VM to host a VPN. It’s not a bad option but it can be insecure unless you know what you’re doing
VPNs still have some practical uses. In terms of privacy, they can help disconnect your IP from your geographic location. Without a VPN every host you connect to can approximate your location down to a few miles.
They are also useful for bypassing country filters or to appear as if you are in another country.
Finally, if it’s your own VPN server, you can use it to access devices on your LAN even when you are far away, negating the need to have a bunch of sensitive servers exposed to the internet. That is actually the original purpose of a VPN.
Without a VPN every host you connect to can approximate your location down to a few miles.
I just tried a few geo-IP lookups of my current IP address, and they all point to a location that (as the bird flies) is almost exactly 100 miles from my actual location. This is despite the ISP I’m using being headquartered in my current city, but maybe they have some infrastructure there?
On mobile data I instead get a location 90 miles away, and if I look up the IP address of another machine I know the exact location of, the result is 60 miles off.
60-100 miles is a pretty generous definition of “a few”.
You are lucky, for many people it’s a lot closer.
Well the one advantage of paying for a service is that you can sue them for contract infringement.
You read VPN contracts??
You don’t?
But the contract states that they will snoop around your data so?
They can do that to a specific degree, yes.
But they shouldn’t be able to sell it to others.
they could of course sell “AnOnYmOuS” data ( that is just identified by 1 specific id, that is just ACCIDENTALLY identifiable to you )
Well it would still be traceable to my persona then.
Correct :D You won the 1st price!
Yup, all “anonymouse” data collection is not really anonym its of course pseudo anonym because the id is not directly calling out hey its from the pc xyz and from the person test, hoooman. Its still in the backend trackable who and where he did it.
This is the best summary I could come up with:
Kape was previously called Crossrider, a company that was named in a research paper by the University of California and Google as being part of an ecosystem of businesses using so-called ad injection technology that could behave maliciously.
Not long ago, many websites lacked security mechanisms to prevent bad actors from eavesdropping on what people were doing when browsing their sites, which opened doors to their data being hijacked.
Many privacy advocates and tech companies pushed for website creators to rewrite their sites to support HTTPS, a security protocol that encrypts traffic and solves most of the aforementioned problems.
This means that VPNs are no longer an essential tool when most people browse the web on a public Wi-Fi network, said Dan Guido, the chief executive of Trail of Bits, a cybersecurity firm.
These days, he added, the people who benefit from a VPN are those working in high-risk fields and who might be targets, like journalists who correspond with sensitive sources and business executives carrying trade secrets while traveling abroad.
The personal hot spot, a feature for wirelessly sharing a smartphone’s cellular data connection with other devices, like your computer, can be activated in the phone’s settings.
The original article contains 1,190 words, the summary contains 198 words. Saved 83%. I’m a bot and I’m open source!
Highly recommend setting up Wirehole on a free tier cloud server. Here’s a link with everything you need, including Docker install: