Was working for a US-based VPN fairly recently. Handled reporting bugs and doing QA testing with the software as well as customer feedback. In one of our internal tools, there was a "folder" that contained all the subpoenas from local law enforcement as well as from the FBI. If the gov't asks for info about a specific user, you hand it to them on silver platter.
What gets me pissed is I'm not doing ANYTHING remotely criminal at all, and I HATE how I have to look "suspicious" just because I'm following my dear old dad's advice of not telling people stuff they don't need to know. People don't NEED to know exactly where I live unless they're sending me something to my doorstep. Most people aren't going to DO that, so I don't want them to know. You don't tell somebody your blood type when you meet them (unless you're doing Japanese dating), so why should I have information like that extracted from me and given to people who don't need it? Mindboggling.
Yeah I feel you, I also specifically hate the "I dont have anything to hide so what does it matter?" group. Right, Im not saying you are hiding something but you wouldnt let anyone in on your bathroom visits either right?
How should all the companies otherwise find new ways to sell you things you don't need? They need to know you better than your spouse or any other family member. The last 20 years that have been the highest priority in western society. Hopefully now when the economy seems to change, people may start to question this data mining aswell.
It has always been this way for those who required privacy and/or anonymity. Thankfully i'm not old enough to witness the full power of the kgb, but even at the end of that era we had to be pretty paranoid about what/where we talk about things. I would imagine they'd be super happy to know we now carry bugs on us completely willingly and even buy them with out own cash.
@@Shimpriv oh man. Where I'm from in the 90's it was a civil war between extremists and the military. bombs everywhere. I remember going to school everyday paranoid af if the car parked in front of me was going to explode or if I was going catch a stray bullet. And in the end a bomb did blow up next to my school while we were in class. Paranoia saved me countless times. But now it evolved into something annoying af, because it's accompanied with PTSD. Sorry for the rant
@@Shimpriv Did anyone you know ever get arrested? Asking out of curiosity, it's one thing to read it in the books, another to ask someone who lived through it.
@@DF-ss5ep Not any close relatives. My granddad and basically entire family from father's side were well off in the 1920s, so he had to spend almost his entire life in the military to protect them from persecution. Some family stories mention colleagues that would be "transferred", but we didn't talk about it much. When i was old enough to witness it all myself the state was already out of gas - yeah a couple of my acquaintances were questioned after a raid on a private rock concert for "west influence" but it felt like nobody was too sure of why they're doing it any more. Well, there's always a chance now to say something unsuitable about current events, i guess - one side would jail me, the other already cancelled me for being born on a certain territory.
Switched to Mullvad over a year ago after listening to Michael Bazzell, replacing PIA. Much happier with it, and my router has direct integration with its Wireguard protocol.
@@roybuscht.9997 GL.inet; they make a 400 mbps VPN router for around $120. Pretty happy with it, they are supposed to be energy efficient and compact, which is nice and all, but I would prefer more performance when adjusting settings in the web interface. Very customizable. Throughput has no issues though, I even played FPS games through my connection and maintained sub 20 ping in most games.
Dan, can you explain to me why this router is preferred over a TPLink or Linksys? Also, can you install open source firmware on your GLinet (e.g. Tomato, openwrt, etc)?
The "private" in VPN means LAN aka private network. VPNs were developed for the task of linking private networks together or user and private network, over WAN. Privacy was never intended, just promoted for the $$$.
LogMeIn Hamachi is a VPN. Around 2013-2014 everyone used it to make running a small Minecraft server with their friends way easier. That's the kind of thing VPN technology was meant to be used for
VPN. AKA Virtual Private Network. AKA tunneling. AKA encapsulating an IP header within another IP header. Example of such [VPN] technology is “GRE Tunnel”. AKA Generic Routing Encapsulation. Known for creating VPN tunnels with no encryption. Can be used for sending IPv6 packets over an IPv4 only network (IPv6 over IPv4 tunnel). Another example for such technology is “IPSEC”. AKA IP security. Known for creating encrypted VPN connections. Is very commonly configured with old and insecure crypto settings (using IKE version 1 instead of IKE version 2, or configure insecure DH groups like 2 or 5 instead of the more secure 20 or 21). Third example of such technology is SSL-VPN. Known for creating secure VPN tunnels using SSL certificates for authentication. AKA VPN tunnel over HTTPS. Mostly only used by companies to give employees secure access to company intranet.
@@ReconScammers well then i guess it's just my experience with mullvad and other vpn services i tried, some of them didn't even have port forwarding like NordVPN
Mullvad is genuinely the best VPN I've ever used, been using it for 5 years and have constantly said that it's the only VPN I would possibly take a sponsorship for (too bad it seems like they don't do sponsorships lol)
Exactly. Let's face the truth, money is the thing that governs the world, but regular users have no financial incentives to run TOR nodes (just like it's in e.g. Bitcoin case). My bet is that most of TOR nodes today are just honeypots run by governments.
@@iirekm I think this is an overly paranoid take. Many people go to great lengths to build ever more and more private software who have nothing to hide but their own privacy. I'm willing to bet that a lot of TOR nodes are actual privacy minded individuals.
@@ForsenArchive I guess nodes run by privacy-minded individuals are a very tiny minority. For 3 reasons: - running node on VPS / cloud services / even old PC in garage costs money, Tor doesn't have any incentives to refund those individuals at least the cost of electricity and risk (read below) - Tor exit nodes are just like any other IP on the internet. If someone commits a crime using your Tor exit node, you will have anti-terrorist police pack at your home at 5 AM, arrest and long trial... unless you're a honeypot made by a government - Running a lot of Tor nodes and lots of "competing" VPN services is simply too good idea for governments not to use it for finding criminals and obtaining intelligence. Want privacy? Use apps with privacy built-in (signal, proton mail, mega drive, Duck Duck Go search engine, physical cash or z-cash/monero, ...), multiple computers and accounts for multiple activities, public internet e.g. in random cafes, SIM card bought in country which still didn't introduce showing ID on card registration. Tor or VPNs over privacy-incapable apps and websites nowadays have little to no sense.
@@iirekmnah bruv, I run multiple nodes because I’m just a huge supporter of internet privacy. I hate the fact that companies and the gov have so much personal info they don’t need abt us
For EU users it should be noted that no, GDPR does not protect you. Although companies should comply, the state institutions do not. The state and its institution can use your personal data virtually however they want.
There is also IVPN. Mullvard and IVPN are the best ones out there. Mullvard is cheaper overall for the same features, IVPN is cheaper if you use all available device-slots for the 2 and 3 year plans for the same features. One of the best features these two VPN providers have is port-forwarding which allows you to expose a single service on one of your computers (e.g. ssh, webserver, password manager, ...) at a static public IP on the internet without having to open your home firewall to external requests or making your own IP known to DDOS script-kiddies.
I've heard you recommend against connecting to TOR while using a VPN a few times in other videos but I'm not sure the reasoning. Could you or someone knowledgeable explain why that's a bad decision? I'm new to privacy and I'm just trying to understand it so I can make better decisions in the future.
I heard if u use VPN with tor VPN goes before tor guide nodes hide better in most cases but if ur in China it's good to have VPN before tor coś it's easier for vpn to bypass firewall i heard that from nordvpn and I'm not sure
8:25 It's probably not just them giving a discount out of the goodness of their heart -- I'm sure the discount is also because these card companies charge merchants up the butt with fees, so Mullvad can afford to drop the price a little bit for payment methods that are almost free to use.
They may not have at the time the comment was posted, but they specifically state that this is true on their website: "Our accepted cryptocurrencies are discounted at 10% due to lower fees and less administration." This is on the pricing page, under the question about discounts. From what I've seen, most stores that accept cryptocurrencies have discounts like this; Mental Outlaw's store does the same ;-)
I'd still challenge the premise that a VPN doesn't help you be anonymous, since masking an otherwise public IP can go a long way in some scenarios. For example, in peer to peer situations, whether it be BitTorrent or attrocities like GTA Online (where everyone with a mod menu can see your IP), even a shitty RUclipsr-sponsored VPN with your credit card on file will be enough to keep peers from obtaining your identity who could otherwise obtain it with ease. They won't necessarily stop Government agencies from getting your data, and the VPN company themselves can potentially use the data they gather on you in ways that violate your privacy, so they're still overall not good tools for anonymity, but in both those examples, Tor is out of the set of options and so a VPN is among your only options to add a layer of anonymity.
Yes. Many think VPN = anon, but in reality VPN = hiding from some specific parties. I use mine at work connected to my works wifi. They know my device and how much data I use, but the use of a VPN makes them unable to snoop on the domains I am connecting to. I am not checking anything bad, but prefer to keep that away from my employer.
Just saying but you don't need a mod menu to know someone's IP, it's a lot easier but if you only have 2 or 3 people in the session you figure it out pretty easily without a mod menu.
i dont get it. whats so bad when someone got your ip address? they can locate where you live and that information is problably about 50-100km wrong. if you dont want to bypass geolocation restrictions a vpn is a waste of money in my opinion.
Every machine has a unique profile. While your home IP may be a very easy way to announce who you are, you need to mask much more. A solid firewall is a must. If you aren't restricting your traffic out, anyone with a brain can figure it out.
I feel like real anonymity is unobtainable while Internet is paid. Your ISP will always need your billing info. The only hope would be to wait until fiber optic infrastructure becomes so cheap you can get it for free, which is not realistic. And again, supporting privacy is not in the best interest of corporations and states, so...
Mullvad is doing a massive ad campaign right now in the subway and at bus stops in Stockholm, Sweden. One of the banners reads something like (translated from Swedish): "If you see this ad, it's completely by accident". Genius.
When police and security services set up a VPN, they used the excuse that it was 6 people that had all left PIA when Kape bought them out. I was able to research and found the IPs coming from a UK Police IP range and stopped using them immediately about a year ago.
My biggest issue with TOR is that people/your ISP *knows* you are using tor. They may not know what for, but they know you are. And when probably only a handful out of many thousands of people in a city use tor, they become persons of interest. Edit: I know there are guard nodes, but it feels as if quite a few of them must be tapped.
They know all the guard nodes too, what you might want to look at is the settings to make Tor settings look like Microsoft update data. This can help on DPI/DPI systems, but newer ones cross reference the traffic and IP, so it is pointless depending on who you are hiding from. A guard node is as insecure as an exit node. I could set one up and inspect and modify traffic. Police and Security Services in the UK do this all the time. Look how many sites that are aimed at privacy still insist on the lowest security settings on Tor Browser and demand scripts are run! That is so they track you and know your real ID. A lot of exit and middle nodes are run by GCHQ and NSA to play with. They can stain traffic going in to see where it comes out, so get the real IP that way. Two university students were threatened or paid not to give a talk on how to de-anonymise Tor users when they went to DEFCON. The talk was pulled as it would have revealed users can be traced easily and ruined the work of the security services. Tor Browser Bundle had firefox changed by developers - because they say it was not hacked - to facilitate Operation Onymous in 2014. Scripts were all set to run, but the program was like that from default instead of how it was previously with everything set to OFF. That was pressure being put on the team by Security Services and they rolled over. Then they allowed all scripts to be run no matter if the setting was on or off. Again, to keep police and security services happy because they were running exploits on Tor Users. You really can't trust anyone.
ANOM was genius, and it is precisely the type of stuff we mean when we fight against complete surveillance and advocate for targeted surveillance of known criminals. Change my mind.
Problem is, how would any law enforcement or intelligence agency know for sure that person they're surveiling is in fact a criminal? (It is especially true for various crimes coomon today, like fraud, money laundering etc). Criminals aren't fools. Plus, it's not only law enforcement who is surveiling people, it's also intelligence agencies.
Regarding using an android phone as a Tor node: you shouldn't recommend it. Battery management on mobile phones is horrible, and even LTT mentioned in a few videos how they've had every single device explode due to being used (as far as I remember) as a server to remote into for some project. Most people would just set up a Tor node on a mobile device and forget it, instead of bothering to implement a system of charging it's battery only when it gets low and stopping once it's full. Even LTT didn't bother to do that. So there would definitely be explosions if that use case is promoted.
And that's why war for privacy shouldn't be sidestepped with "fixes" like VPN. It should be fought with being outspoken and action. "Fixes" like VPNs are not fixing things at all, they justs swep the problem under the rug so you, consooomer, don't need to "worry" about it.
You've shown what to look for into VPN's as well as DNS's an TOR, I'd suggest making a video about proxies to complement these topics would be helpful.
One major VPN use of mine is to connect to RUclips somewhere outside the US during election season so I don't get flooded with cringe political ads. Using it for that, any free nonsense VPN does the job.
an important thing to note is that the talking points used for the VPNS in ad reads has started to shift towards the "Watch British nflix in America" thing more than privacy (but still mentioning it).
@@J43rv1 He was caught because he admitted to the authorities he did it. Mental Outlaw even said himself a few times don't admit to anything, they knew he was using TOR yeah and that made him suspect #1 but just using TOR wasn't what got him caught. That said though if they seized his computer I am almost positive they would of found more evidence.
@@ghostymytoasty7007 They correlated his usage of the internet with the same time the posts were made. What I'm saying is, for the original question, it doesn't matter if you're using a VPN or TOR on Public paid wifi/university wifi, you can still be identified. Unless I don't understand his comment.
But how?? Dont they "ban" your access to internet untill you pay? Or does it just put some sort of limit making it impossible to surf the internet comfortably?
For anyone: Anonymity and secrecy are inherently contradicting each other as any anonymous software require external (therefor less secure) servers as a proxy. Also windows version of tor browser is relatively vulnerable to traditional cyber attacks as well. Tails linux equipped with end to end encryption tools such as pidgin paired with xmpp and https everyware may mitigate the risk of it. Though there is a risk of MiTM attack from exit node.
I bought NordVPN about 5 years ago using Tor and bitcoin bought with cash, so it's not the only company that offers this. Although now I wouldn't trust NordVPN. Just saying this seems like a sales pitch for Mullvad.
True. But there really isn’t trustworthy countries to begin with. Want to escape the 14 eyes? Go to a sketchy country (ie China, Russia). Oh? You don’t trust sketchy countries with your data? Well, who would you really trust? Nobody
Mullvad doesnt hide that fact, they talk about it on their website. They are pretty transparent about that stuff which i respect. Being part of 14 eyes doesn't mean they are definitely monitoring.
One thing I've liked about Vtubers is that they haven't had sponsored ads on streams. Probably because they're with an agency, but the result is the same.
Unlike vpns, people can black list tor exit nodes, tor also don't like captchas Seems harder to block, filter, or ban VPN based ips Tor is more secure typically because you're trading bandwidth for the cost of better data privacy
Can you talk about tor guard? It managed to become court proven by refusing to give up logs to the company/companies throwing copyright lawsuits against them in regards to torrenting, and instead opting for making it so that only US servers can't torrent (but other servers can).
I'm waiting for Kenny's VPN! :)) Monero will be the only payment option and on landing page will display "connect to this site from coffee shop's wi-fi or tor" :D
What I also love also Mullvad is they don't offer huge bulk discounts like many other big providers. Most VPNs try to suck you in giving you $2-3/month deals for a 2 year plan, but a $8-10/month deal for monthly subscriptions. With Mullvad, it's 4.5 euro a month with any plan.
A Calyx Institute MiFi Hotspot ordered with a computer running Tails over a public WiFi bought with XMR shipped to a mail drop for a Wyoming LLC at a registered office ran by your attorney and forwarded to you by the attorney's office is about the most private access point you can get as an entry point to the Internet. After that connect via Tor over a VPN paid for with XMR. That is about as anonymous and private as you can get thanks to Attorney-Client privilege. Of course never put the sim into that hotspot anywhere near a location that can be associated with you.
@@wrockd it is adding one more hop of obfuscation and adding yet another layer of fruitless investigative sourcing. The ISP doesn't know you were connected to Tor. Tor doesn't know where you are coming from, and the VPN provider only knows that you came from a mobile hotspot and went out to a Tor node. It removes single points of failure.
@@jeremyleonbarlow TOR Guards work much better for that purpose, as they mitigate that exact single point of failure that you're talking about. VPNs are Centralised and Your ISP can figure out exactly which VPN Provider you're using just by looking at the IP, after that all it takes is an email exchange between two governments to hand over your data from that VPN company (14 eyes and 7 eyes exist). And now you've got a single entity with logs of all your activities, that's a single point of faliuee. For obfuscating TOR usage using TOR Guard nodes is much better, they Obfuscate the traffic behaviour to look like common traffic, and by the time they get recognised/registered as TOR Guard nodes by your ISP they are already replaced.
Privacy and Anonymity are completely different. Tor was compromised in 2013, users can be identified by rogue nodes and traffic staining techniques. That is why GCHQ runs a lot of Tor Nodes. The Tor Browser Bundle was altered, possibly with the agreement of the developers to assist Law Enforcement with Operation Onymous in 2014. All the default security settings were changed to the lowest level and scripts were turned on. The script feature was also left operating despite the setting being set to off/blocked in later releases - to assist further with police investigations. The way it worked was that sites run a script when a user connected and the Tor Browser Bundle firefox sent replies outside Tor, back to Law Enforcement. Certain sites were given ID numbers and once the user connected, firefox run the script and identified the real IP address of the person. Tor Project would never answer questions over this. They also presented for download a version in November and December 2013 that had a "profiler trojan" built in, but only identifiable by Kaspersky antivirus at the time, because that company would not assist with exposing users. Some sites had pictures and videos that were modified, so they would cause a video player or picture viewer program to call for extra resources or a CODEC. Unless you blocked this or set VLC, for example, to connect out on a random IP and Port, you would be connected to Law Enforcement and they tracked you. Other files were just remote access trojans and law enforcement just sat watching what users did. VPNs are dangerous. RUclips affiliates only advertise them as they earn up to 40% of each referral. Most are only Proxy Servers, not VPNs. They operate on rented equipment in datacnters like M247 Ltd - who are forced to hand over all data in the UK at the request of police with a Production Order. The VPN collects, inspects, manipulates and redirects your data and sifts through to see if there is anything they can add to a user profile. Some VPNs want email addresses, phone numbers, WifI info, contact lists, PRECISE LOCATION and also your credit card details as your verified profile is sold for more. Even if the VPN doesn't collect all your data, the Host Company can and does sell it to whoever wants it A VPN only hides the IP, technology has moved on in the past 10years, now it is possible to trace anyone anywhere. Security Services can locate a person using facial recognition, using input from doorbells, CCTV, phones, ANPR etc. They can also tell who is with you if you are talking near a phone or alexa, or some TVs.
It's well proven by now, that if a well meaning company grows too big, becomes too corporate, they end up becoming the bad guys, so yeah. Although, might as well ride the wave while it's radical. 🏄♂
One could also pay for other vpn services via prepaid cards, or similar. There would have to be additional steps taken to keep your identity somewhat sterile, in registration, and use; but, it wouldn't be impossible.
@@RuthlessNoise if you pay for a pre-paid card with cash then the only way the card itself can be traced back to you is if someone looks at surveillance footage and sees you buying it but even then i think there would have to be a lot of other factors coming together.
They are the best Wireguard vpn provider IMO, I have benchmarked so many VPNs and Mullvad comes out on top all the time. Better speed and better battery life.
I don't use a vpn for privacy but I do value my privacy.... I self host my own vpn so I can take advantage of a secure wan into my own network at home. I am currently using my own self hosted openvpn and I have deployed others before as well, would be cool to see something covering how well secured those solutions tend to be and if they have some privacy issues as I wouldn't be surprised if they have some telemetry reporting services packed in. It is open source but most people including myself don't have the time to comb through all that and even if I did I am not a cyber security expert and even someone who is could miss things. happens all the time. Too me a vpn is a way to make a cheap wan.
What do you mean you self host it? And if you self host does it mean that you're doing it from your location? Doesn't it kind of defeat the purpose? Cause your location would still be known.
@@gabriel-x7x9g self hosting a vpn does add some additional protections but the goal isn't so much to do what your assuming. I can use it as a WAN solution to interact with my network and hosted content within it while remote.
I love how from the description alone you can infer that the ANON Phone was an obvious scam yet real criminals that operates outside the law fell for the meme, it is almost comical
it's also worth noting that it seems like if you DO pay with a method like debit card or paypal, the receipt gets yeeted in 40 days. and you can pay with actual cash. since mail doesn't require a return address, i'd say that's pretty anonymous. of course, they can still see your IP address and who knows when/if they get rid of it. you just have no way of actually knowing. as far as VPNs go, though, they're the best you've got.
VPN should really just be used for unlocking geo-locked content and pretty much nothing else unless you know what you are doing. Same way ISPs puke data to police/fbi/whatever other government agency VPNs will do the same and lot of them said they have no logs policy but they are apparently required to collect logs or something like that. Like only benefit I really see is if you are from country X, VPN is in country Y and country X agencies cannot request logs from company based in country Y.
You can also opt for an overall privacy boost of the entire Internet by obfuscation, in that case trigger red flags for nothing would be a good strategy, I mean, people are already doing that. Don't forget that behind that frontface of everyday heroes there's a lot of creepy bastards.
But the Monero blockchain is private, so as long as you don't send it directly from the exchange to whomever you're paying, there is no way to trace what you did with the moneroj. In other words, just withdraw it from the exchange to your own wallet first, then pay anyone from there, and there's no practical way to trace that trail on the blockchain. And for anything else you can use something like Incognito app ruclips.net/user/incognitochain
The waifu thumbnail got me into watching your video. Although I'm in mixed bag with privacy, I'll probably use it when I move out of family house in future when living my own.
isnt mullvad located within a 14 eyes country and thus basically forced to give out your IP address, without informing you, whenever anyone wants it? not saying nordvpn wouldnt do that, but they at least are outside the 14 eyes. While sure they need an email address one could theoretically create a throw away email using tor, and activate it by purchasing a one year gift card in some electronics store. You also seem to be able to pay with monero now, but no idea what data they want for you to be able to do so. again, I'm not saying nordvpn is good or bad, i just dont think mullvad really is much better. or am I missing something?
Yes Mullvad could be completely compromised but the point of the video is that it doesn't even matter if they're compromised since they never get your information besides an IP address anyway. It means they could still be valuable to use even if the internet connection runs straight to the CIA headquarters.
@@joey199412 I mean if they got my IP they basically got everything they need to know who I am, in which case I could have just used my credit card in the first place
@@julikaiba No. In order to even connect your IP to you, they need to have some sort of pressure on your ISP, like law enforcement. And even then mullvad would have to keep logs of what traffic exactly goes to what IP address. Then, and only then, would it matter that mullvad is in a 14 eyes country.
Is it possible to run a TOR relay on a VM in Google cloud? I've been playing with some VMs on the free level google clouds, and the bandwidth is massive, could be a good way to claw back some anonymity through the all seeing google.
I don't understand why nobody is talking about Sybil Attacks in the tor network? It's old as shit and the glowies are all up in the mix since like foreeever, how people can be so ignorant to this just blows my mind. If you want a true VPN/onion router, then either set up your own personal exit node within the lokinet network, or fork the project as everything is open source.
@@bravefastrabbit770 The only argument I see for Lokinet vs Tor in regards to Sybil attacks is that you have to stake Oxen to run a node. As if governments and other "bad" actors couldn't afford this?
I don't see the problem with putting a credit card to pay for your VPN, when you connect to a server it's a single IP address that is shared with multiple other users that are also using the same connection, how could the feds directly trace it back to you?
2:41 Lol. At this point, the only way to be sure you're really anonymous, is to write the software yourself, and to design and manufacture the hardware yourself. And even then, as soon as you connect it to the internet or the mobile network, you might be able to guarantee under some circumstances that your communications are private, but you can never be sure that you're able to hide who you are and with whom you communicate.
Agreed, even home routers are inspecting and collecting all your traffic. Have you noticed how many of them hide it as antivirus monitoring or traffic shield systems.
The only reasons someone would need a vpn is either 1- you are doing something illegal or 2- you live in a very restricted country that doesn't allow you to visit any social media or 3- you want to watch netflix on other regions (Which if that's your only use why are you paying for a paid vpn just use a free one)
One question tho, is it your choice that your relay server is an end node, or an inner node? Can you choose? If not, then wouldn't that just prove that most of the end nodes are controlled by the feds? Because if they control both the end nodes that i use (the one that my packet enters and the one that it exists), then they can easily know who is sending which packet.
And that is how it works! Exactly how you are identified using Tor, they stain the traffic going in and look for it on the exit nodes. GCHQ and NSA monitor all Tor nodes are correlate the traffic.
What's your opinion on double VPN? Using a VPN to connect your PC, then starting a VM and connecting to another VPN. Theoretically this would obfuscate your IP address to the point of near anonymity.
Shouldn't work in theory, VMs are typically bridged to your physical adapter on your PC meaning that the traffic would both be going out from the same physical NIC and destined for two separate servers. Wouldn't be any different than running through a single VPN tunnel
@@ethanmorris36 ok yes that makes sense. What about using your VPN to connect on a VPS and then chaining with another VPN? I know this is probably bogus but I try to think of methods to achieve this. Double VPN did something similar but was cancelled by the glowies.
@@ElectronNDubstep it can be tracked obviously, but it will take much more time & effort. you'll be tracked even if you use VM. encrypt your PC with veracrypt and use doublehop vpn, that's the best thing you can do.
@@ainzooalgown9952 I doubt what the OP is saying is true, but to be fair it's irrelevant to them; whethever it's illegal or not. The feds broke law before
@@karolbomba6704 oh it's true. Whether it's practical or if the charges would stick is irrelevant - you are responsible for all traffic through that Tor Relay. Running a device that accepts CP from one user and sends it to another is still a violation of CP laws CP was just an example
@@ainzooalgown9952 a user like you downloads a Tor Relay - then gets trapped by the feds. You then agree to continue running your relay as an informant to keep yourself out of trouble - you refuse? You go to jail to await trial while the government continues to run your relay Tor is the worst opsec
VPN's are hiding your IP from the sites you visit, I think it's the most important part. If you don't want to hide from feds, but want to avoid getting tracked by Google and other sites, pretty much any VPN will do the job. In this sense, any VPN is anonymous, because it blends you with other people that use that VPN service (of course VPN service itself can see which sites you visit, but only domain names, 99.99% of traffic is HTTPS)
and as dr here points out, your browser, supercookies, settings, uids, etc will let them track you anyways. if there was any chance that vpns would hurt big techs advertising income they wouldn't be allowed to exist and they certainly wouldn't allow adverts for them on their platforms lmao the only way to hide from the feds is to either not exist or be such a generic rule-loving normie that your daily twelve terabytes of data never get looked at because you not only had nothing to hide and did nothing wrong but you were also extremely boring and constantly emitted drool from the mouth like a good little puppet :D
ONLY your IP is hidden, Google and others still know exactly who you are from many different ways. Cookies, supercookies, canvas fingerprinting, browser and device fingerprinting, the way you type, what you look at, what you do online etc. Technology has changed, so a VPN is not protecting people. Most will connect to youtube via a VPN, log-in with their Google account and wonder how they were traced!!!
Remember one thing, all these VPN servers are in different countries around the world with different laws. Most are contracted datacenters that have their own rules and regulations
If it is in the UK like M247 Ltd, then all your data can be turned over to police and security services. Unfortunately Mullvad has servers located in their datacenter.
@@Basement-Science Extra steps like sending a letter without a return address or using a fake address? Get an envelope, sufficient stamps, fill out the details for the recipient, leave the return address blank or enter a fake address, insert cash and payment token number, then pop it into a postal collection point. If you're extra paranoid, handle everything with gloves, obscure your appearance and do so at night, to avoid CCTV identification. Not sure how the postal service can find out who this person is.
@@Basement-Science PS, if serial numbering stamps became a common practice, or otherwise adding obscure but identifiable marks within the stamp imagery, along with serialised barcodes at Point of Sale to marry the stamp set to the purchaser (banking details or CCTV footage in the case of a cash sale), then I could see this avenue of anonymity being stamped out (ugh, sorry, pun not intended).
@@beardymcbeardface69 Yes, you'll have to go full paranoia mode and the postal service still knows where you deposited the letter, roughly when, who you sent it to and potentially if you did so repeatedly. (correlate letters going to the recipient with CCTV footage of people sending those letters.) Additionally the letters can be inspected in transit, can get lost without your knowledge (or claimed to be, by the recipient, or someone who steals it) etc. With BTC used with good privacy precautions (send transactions through TOR etc), the most significant thing people can find out is where your money came from (for example where you bought it) and where you sent it (which can be a new, unknown address each time) In the end one is not strictly more private than the other, they are just different. And of course most people use neither approach with maximum privacy anyway.
@@Basement-Science "the postal service still knows where you deposited the letter, roughly when, who you sent it to and potentially if you did so repeatedly" Yes but the _"you"_ is unknown at this point. A person this paranoid should not be repeatedly using the same mail collection point and ought to be paying yearly to reduce their collection point visits. This person who is so paranoid, should also accept the risk of their payment being lost, since they are going to such extraordinary lengths to try to be anonymous.
Currently using IVPN, in my opinion the only true competition to mullvad VPN. Both don't require email and phone number for using the service, both offer 1 month membership and longer.
Im convinced now Menatal outlaw's channel is a honey pot.
Long con
😅😭🤣
why?
@@jomo_sh barely watched, but he seems to be a noob and gets to things late.
@@jomo_sh The comment is Satire
Was working for a US-based VPN fairly recently. Handled reporting bugs and doing QA testing with the software as well as customer feedback. In one of our internal tools, there was a "folder" that contained all the subpoenas from local law enforcement as well as from the FBI. If the gov't asks for info about a specific user, you hand it to them on silver platter.
that's america, you can't speak for other sites.
also, if you don't keep logs the company can't hand it over.
VPN's that don't keep logs are safe.
God I hate the government so much
Doesnt your company have no logs policy?
@@merkava9122 Thats not how that works. If the FBI wants your info The FBI gets it Blame Bush and the Patriot act
@@merkava9122 it’s literally illegal to permit government interferences
What gets me pissed is I'm not doing ANYTHING remotely criminal at all, and I HATE how I have to look "suspicious" just because I'm following my dear old dad's advice of not telling people stuff they don't need to know. People don't NEED to know exactly where I live unless they're sending me something to my doorstep. Most people aren't going to DO that, so I don't want them to know. You don't tell somebody your blood type when you meet them (unless you're doing Japanese dating), so why should I have information like that extracted from me and given to people who don't need it?
Mindboggling.
Yeah I feel you, I also specifically hate the "I dont have anything to hide so what does it matter?" group.
Right, Im not saying you are hiding something but you wouldnt let anyone in on your bathroom visits either right?
What does blood type have to do with japanese dating?
Seriously though. I just want to protect my privacy.
@@indexwell6546 weird japanese culture thing
How should all the companies otherwise find new ways to sell you things you don't need? They need to know you better than your spouse or any other family member.
The last 20 years that have been the highest priority in western society.
Hopefully now when the economy seems to change, people may start to question this data mining aswell.
The 21st century, the century where Paranoia is your bestfriend.
@Locked no
It has always been this way for those who required privacy and/or anonymity. Thankfully i'm not old enough to witness the full power of the kgb, but even at the end of that era we had to be pretty paranoid about what/where we talk about things. I would imagine they'd be super happy to know we now carry bugs on us completely willingly and even buy them with out own cash.
@@Shimpriv oh man. Where I'm from in the 90's it was a civil war between extremists and the military. bombs everywhere.
I remember going to school everyday paranoid af if the car parked in front of me was going to explode or if I was going catch a stray bullet. And in the end a bomb did blow up next to my school while we were in class. Paranoia saved me countless times. But now it evolved into something annoying af, because it's accompanied with PTSD.
Sorry for the rant
@@Shimpriv Did anyone you know ever get arrested? Asking out of curiosity, it's one thing to read it in the books, another to ask someone who lived through it.
@@DF-ss5ep Not any close relatives. My granddad and basically entire family from father's side were well off in the 1920s, so he had to spend almost his entire life in the military to protect them from persecution. Some family stories mention colleagues that would be "transferred", but we didn't talk about it much.
When i was old enough to witness it all myself the state was already out of gas - yeah a couple of my acquaintances were questioned after a raid on a private rock concert for "west influence" but it felt like nobody was too sure of why they're doing it any more.
Well, there's always a chance now to say something unsuitable about current events, i guess - one side would jail me, the other already cancelled me for being born on a certain territory.
Haha, this great because glowies in Europe recently tried to raid Mullvad offices and came away with NOTHING
Absolutely based and anon pilled
Switched to Mullvad over a year ago after listening to Michael Bazzell, replacing PIA. Much happier with it, and my router has direct integration with its Wireguard protocol.
Which router do you use? I use L2TP with mine and its unreliable
@@roybuscht.9997 Probably GL-iNet, they're quite ok. Asus seems to have a few models that can handle decent WireGuard throughput, too.
@@roybuscht.9997 GL.inet; they make a 400 mbps VPN router for around $120. Pretty happy with it, they are supposed to be energy efficient and compact, which is nice and all, but I would prefer more performance when adjusting settings in the web interface. Very customizable. Throughput has no issues though, I even played FPS games through my connection and maintained sub 20 ping in most games.
Dan, can you explain to me why this router is preferred over a TPLink or Linksys? Also, can you install open source firmware on your GLinet (e.g. Tomato, openwrt, etc)?
@@Ooooooooooo are you sure VPN makes you private ?
When a sincere video by someone who just knows what they're talking about is more convincing than thousands of dollars in advertising
The "private" in VPN means LAN aka private network. VPNs were developed for the task of linking private networks together or user and private network, over WAN.
Privacy was never intended, just promoted for the $$$.
That is an interesting thing I've heard today
This should be the top comment.
LogMeIn Hamachi is a VPN. Around 2013-2014 everyone used it to make running a small Minecraft server with their friends way easier. That's the kind of thing VPN technology was meant to be used for
VPN. AKA Virtual Private Network. AKA tunneling. AKA encapsulating an IP header within another IP header. Example of such [VPN] technology is “GRE Tunnel”. AKA Generic Routing Encapsulation. Known for creating VPN tunnels with no encryption. Can be used for sending IPv6 packets over an IPv4 only network (IPv6 over IPv4 tunnel). Another example for such technology is “IPSEC”. AKA IP security. Known for creating encrypted VPN connections. Is very commonly configured with old and insecure crypto settings (using IKE version 1 instead of IKE version 2, or configure insecure DH groups like 2 or 5 instead of the more secure 20 or 21). Third example of such technology is SSL-VPN. Known for creating secure VPN tunnels using SSL certificates for authentication. AKA VPN tunnel over HTTPS. Mostly only used by companies to give employees secure access to company intranet.
The big thing is that vpn encryption prevents sslv break and inspect by your ISP.
Mullvad is a godsend, not only for privacy but piracy. Setting up port forwarding is so easy than other vpn services.
@@ReconScammers yeah I use speedify and it's basically 1 click
I run my tor exit relay over mullvad, works great.
@@ReconScammers well then i guess it's just my experience with mullvad and other vpn services i tried, some of them didn't even have port forwarding like NordVPN
What's port forwarding? Complete newbie here if anybody got the time to explain will be greatly appreciated
@@ahmadramzy2716 ruclips.net/video/jfSLxs40sIw/видео.html
Mullvad is genuinely the best VPN I've ever used, been using it for 5 years and have constantly said that it's the only VPN I would possibly take a sponsorship for (too bad it seems like they don't do sponsorships lol)
omg tf2 pedo
I mean you could promote them for free.
@@cloudynguyen6527 i already do to everyone who asks lol
I just saw a mullvad banner on a bus just outside of Chicago, so there's that
@@danielrobinson3654interesting. it's fine as long as they don't sponsor RUclipsrs and celebrities
"If you truly want to be anonymous, you use TOR" - Proceeds to immediately tell you TOR is actually weak and can in fact be, not anonymous.
Exactly. Let's face the truth, money is the thing that governs the world, but regular users have no financial incentives to run TOR nodes (just like it's in e.g. Bitcoin case). My bet is that most of TOR nodes today are just honeypots run by governments.
@@iirekm I think this is an overly paranoid take. Many people go to great lengths to build ever more and more private software who have nothing to hide but their own privacy. I'm willing to bet that a lot of TOR nodes are actual privacy minded individuals.
@@ForsenArchive I guess nodes run by privacy-minded individuals are a very tiny minority. For 3 reasons:
- running node on VPS / cloud services / even old PC in garage costs money, Tor doesn't have any incentives to refund those individuals at least the cost of electricity and risk (read below)
- Tor exit nodes are just like any other IP on the internet. If someone commits a crime using your Tor exit node, you will have anti-terrorist police pack at your home at 5 AM, arrest and long trial... unless you're a honeypot made by a government
- Running a lot of Tor nodes and lots of "competing" VPN services is simply too good idea for governments not to use it for finding criminals and obtaining intelligence.
Want privacy? Use apps with privacy built-in (signal, proton mail, mega drive, Duck Duck Go search engine, physical cash or z-cash/monero, ...), multiple computers and accounts for multiple activities, public internet e.g. in random cafes, SIM card bought in country which still didn't introduce showing ID on card registration. Tor or VPNs over privacy-incapable apps and websites nowadays have little to no sense.
@@iirekmnah bruv, I run multiple nodes because I’m just a huge supporter of internet privacy. I hate the fact that companies and the gov have so much personal info they don’t need abt us
@@arrowhead1235 thankyou
For EU users it should be noted that no, GDPR does not protect you. Although companies should comply, the state institutions do not. The state and its institution can use your personal data virtually however they want.
Based communist
There is also IVPN. Mullvard and IVPN are the best ones out there. Mullvard is cheaper overall for the same features, IVPN is cheaper if you use all available device-slots for the 2 and 3 year plans for the same features.
One of the best features these two VPN providers have is port-forwarding which allows you to expose a single service on one of your computers (e.g. ssh, webserver, password manager, ...) at a static public IP on the internet without having to open your home firewall to external requests or making your own IP known to DDOS script-kiddies.
What about X-VPN for general browsing and research stuff?
@@alpha12081 ye no 😂
I've heard you recommend against connecting to TOR while using a VPN a few times in other videos but I'm not sure the reasoning. Could you or someone knowledgeable explain why that's a bad decision? I'm new to privacy and I'm just trying to understand it so I can make better decisions in the future.
Guard nodes already provide the service of hiding the fact that you're using Tor.
@@MentalOutlaw Okay thank you, I'll look into that
@@TruthBehindTheLies idk truth, you acting kinda sus as a roblox youtuber on tor :/
I heard if u use VPN with tor VPN goes before tor guide nodes hide better in most cases but if ur in China it's good to have VPN before tor coś it's easier for vpn to bypass firewall i heard that from nordvpn and I'm not sure
I think ud have to use VPN wire wall or something
8:25 It's probably not just them giving a discount out of the goodness of their heart -- I'm sure the discount is also because these card companies charge merchants up the butt with fees, so Mullvad can afford to drop the price a little bit for payment methods that are almost free to use.
@@ethgod yes + 25-50 cent on top as a flat fee
the discount CODE is so that the YTer gets credit for sending business to VPN.
They may not have at the time the comment was posted, but they specifically state that this is true on their website: "Our accepted cryptocurrencies are discounted at 10% due to lower fees and less administration." This is on the pricing page, under the question about discounts. From what I've seen, most stores that accept cryptocurrencies have discounts like this; Mental Outlaw's store does the same ;-)
I'd still challenge the premise that a VPN doesn't help you be anonymous, since masking an otherwise public IP can go a long way in some scenarios. For example, in peer to peer situations, whether it be BitTorrent or attrocities like GTA Online (where everyone with a mod menu can see your IP), even a shitty RUclipsr-sponsored VPN with your credit card on file will be enough to keep peers from obtaining your identity who could otherwise obtain it with ease. They won't necessarily stop Government agencies from getting your data, and the VPN company themselves can potentially use the data they gather on you in ways that violate your privacy, so they're still overall not good tools for anonymity, but in both those examples, Tor is out of the set of options and so a VPN is among your only options to add a layer of anonymity.
Yes. Many think VPN = anon, but in reality VPN = hiding from some specific parties. I use mine at work connected to my works wifi. They know my device and how much data I use, but the use of a VPN makes them unable to snoop on the domains I am connecting to. I am not checking anything bad, but prefer to keep that away from my employer.
Just saying but you don't need a mod menu to know someone's IP, it's a lot easier but if you only have 2 or 3 people in the session you figure it out pretty easily without a mod menu.
i dont get it. whats so bad when someone got your ip address? they can locate where you live and that information is problably about 50-100km wrong. if you dont want to bypass geolocation restrictions a vpn is a waste of money in my opinion.
I'm with the author of this thread. I use mullvad with bad opsec and do illegal stuff all the time.. Not in jail atm
Every machine has a unique profile. While your home IP may be a very easy way to announce who you are, you need to mask much more. A solid firewall is a must. If you aren't restricting your traffic out, anyone with a brain can figure it out.
I feel like real anonymity is unobtainable while Internet is paid. Your ISP will always need your billing info. The only hope would be to wait until fiber optic infrastructure becomes so cheap you can get it for free, which is not realistic. And again, supporting privacy is not in the best interest of corporations and states, so...
Too bad you can't phreak I guess.
I mean, you could use someone else connection, thus someone else, ISP?
It's illegal but it's a way nonetheless lol
@@reforcoescolar7881 yeah, at that point is like... What the hell are you even doing? I was even going to suggest public Wi-Fi.
@@darkcoeficient tru, forgot about em
even if u could connect urself to the internet physically you would still need to pay the iana to get an ip address
Mullvad is doing a massive ad campaign right now in the subway and at bus stops in Stockholm, Sweden. One of the banners reads something like (translated from Swedish): "If you see this ad, it's completely by accident". Genius.
You actually shouted out the best vpn. Actually great speeds and no bs for torrenting. God bless them.
As someone who switched to mullvad after the PIA buyout I'm happy to see you covering them.
When police and security services set up a VPN, they used the excuse that it was 6 people that had all left PIA when Kape bought them out. I was able to research and found the IPs coming from a UK Police IP range and stopped using them immediately about a year ago.
Always get excited when I see your videos, you have literally been my favourite youtuber for a long time now. Keep up the great work
Alongside Som€Ordin@ry Ganner
Its here, finally!
My biggest issue with TOR is that people/your ISP *knows* you are using tor. They may not know what for, but they know you are.
And when probably only a handful out of many thousands of people in a city use tor, they become persons of interest.
Edit: I know there are guard nodes, but it feels as if quite a few of them must be tapped.
What’s a guard node?
@@kevinbarber2795 in the context of this I'm assuming it means an entrance node which some how some way makes it so that your isp doesn't know
If you live in a 3rd class country, random not-so popular city, and only a few people within a mile radius uses Tor. Then it could be a problem. (?)
@@ray8776 You & the OP forgot bridges (Tor) exists
They know all the guard nodes too, what you might want to look at is the settings to make Tor settings look like Microsoft update data. This can help on DPI/DPI systems, but newer ones cross reference the traffic and IP, so it is pointless depending on who you are hiding from. A guard node is as insecure as an exit node. I could set one up and inspect and modify traffic. Police and Security Services in the UK do this all the time. Look how many sites that are aimed at privacy still insist on the lowest security settings on Tor Browser and demand scripts are run! That is so they track you and know your real ID.
A lot of exit and middle nodes are run by GCHQ and NSA to play with. They can stain traffic going in to see where it comes out, so get the real IP that way.
Two university students were threatened or paid not to give a talk on how to de-anonymise Tor users when they went to DEFCON. The talk was pulled as it would have revealed users can be traced easily and ruined the work of the security services.
Tor Browser Bundle had firefox changed by developers - because they say it was not hacked - to facilitate Operation Onymous in 2014. Scripts were all set to run, but the program was like that from default instead of how it was previously with everything set to OFF. That was pressure being put on the team by Security Services and they rolled over.
Then they allowed all scripts to be run no matter if the setting was on or off. Again, to keep police and security services happy because they were running exploits on Tor Users.
You really can't trust anyone.
VPN's are anonymous to an outside observer. The problem is if the VPN company is connecting data.
ANOM was genius, and it is precisely the type of stuff we mean when we fight against complete surveillance and advocate for targeted surveillance of known criminals. Change my mind.
Problem is, how would any law enforcement or intelligence agency know for sure that person they're surveiling is in fact a criminal? (It is especially true for various crimes coomon today, like fraud, money laundering etc). Criminals aren't fools.
Plus, it's not only law enforcement who is surveiling people, it's also intelligence agencies.
Regarding using an android phone as a Tor node: you shouldn't recommend it. Battery management on mobile phones is horrible, and even LTT mentioned in a few videos how they've had every single device explode due to being used (as far as I remember) as a server to remote into for some project.
Most people would just set up a Tor node on a mobile device and forget it, instead of bothering to implement a system of charging it's battery only when it gets low and stopping once it's full. Even LTT didn't bother to do that. So there would definitely be explosions if that use case is promoted.
Lipo battery inside mobile phone wouldn't just suddenly explode when overly discharged right?
Wait what
@@anubmusing9749 i think it is more about the temperature, as phone batteries can get pretty hot when using the device while charging it
@@sigmamale4147 you'd have to find a phone that lets you connect directly to the wall without a battery which i don't think exist
@@sigmamale4147 I am pretty sure most smartphone now will just shut off when your battery or cpu is overheating.
And that's why war for privacy shouldn't be sidestepped with "fixes" like VPN.
It should be fought with being outspoken and action.
"Fixes" like VPNs are not fixing things at all, they justs swep the problem under the rug so you, consooomer, don't need to "worry" about it.
You've shown what to look for into VPN's as well as DNS's an TOR, I'd suggest making a video about proxies to complement these topics would be helpful.
YES, PLEASE
One major VPN use of mine is to connect to RUclips somewhere outside the US during election season so I don't get flooded with cringe political ads. Using it for that, any free nonsense VPN does the job.
an important thing to note is that the talking points used for the VPNS in ad reads has started to shift towards the "Watch British nflix in America" thing more than privacy (but still mentioning it).
Mullvad has an unique ability bypass public paid wifi, such as (college) dorms or hotels.
If your in a dorm type situation, you could test this out.
Not a good idea at all. Remember how they caught the kid who posted bomb threats to get out of finals at Harvard? He was even using TOR.
@@J43rv1 He was caught because he admitted to the authorities he did it. Mental Outlaw even said himself a few times don't admit to anything, they knew he was using TOR yeah and that made him suspect #1 but just using TOR wasn't what got him caught.
That said though if they seized his computer I am almost positive they would of found more evidence.
@@ghostymytoasty7007 They correlated his usage of the internet with the same time the posts were made. What I'm saying is, for the original question, it doesn't matter if you're using a VPN or TOR on Public paid wifi/university wifi, you can still be identified. Unless I don't understand his comment.
@Livity that can't be true
But how?? Dont they "ban" your access to internet untill you pay? Or does it just put some sort of limit making it impossible to surf the internet comfortably?
oh fuck yeah i love mullvad, switched to them after a few years of pia
pia better, worst decision
@@V3locities Look at who owns PIA
@@Lex_InvictusKape Technologies, a company that used to develop malware.
Would be nice to expand on the issues involved in hosting a tor exit node. It seems like a pretty high risk.
It does seem that way but tor has been through the ringer with gov agencies trying to take it down or mitigate its uses
For anyone:
Anonymity and secrecy are inherently contradicting each other as any anonymous software require external (therefor less secure) servers as a proxy. Also windows version of tor browser is relatively vulnerable to traditional cyber attacks as well.
Tails linux equipped with end to end encryption tools such as pidgin paired with xmpp and https everyware may mitigate the risk of it. Though there is a risk of MiTM attack from exit node.
@@spyj1900 It just doesn’t seem very likely to happen
@@itsawill9268 Yet it was created by the military?
That's why you don't do that... He runs a tor relay, two different things.
Interesting! Will give this a look. Also that FBI back door cellphone is terrifying.
I bought NordVPN about 5 years ago using Tor and bitcoin bought with cash, so it's not the only company that offers this. Although now I wouldn't trust NordVPN. Just saying this seems like a sales pitch for Mullvad.
Mullvad is based on Sweden. And Sweden is part of the 14 eyes.
True. But there really isn’t trustworthy countries to begin with.
Want to escape the 14 eyes? Go to a sketchy country (ie China, Russia). Oh? You don’t trust sketchy countries with your data? Well, who would you really trust? Nobody
Mullvad doesnt hide that fact, they talk about it on their website. They are pretty transparent about that stuff which i respect. Being part of 14 eyes doesn't mean they are definitely monitoring.
@@lazar2949 definitely monitoring doesn't matter. Possibly monitoring does
And theyve had multiple court proceedings, and they show the court details, they provide nothing. Dont underestimates swedes love for piracy
One thing I've liked about Vtubers is that they haven't had sponsored ads on streams. Probably because they're with an agency, but the result is the same.
imagine marketing yourself as authentic and "down to earth" but breaking the status quo of no sponsors xd
Mullvad also has public billboards here in their hometown of Gothenburg.
Fun too see them doing well.
Unlike vpns, people can black list tor exit nodes, tor also don't like captchas
Seems harder to block, filter, or ban VPN based ips
Tor is more secure typically because you're trading bandwidth for the cost of better data privacy
a few hours ago i saw an ad for mullvad on a bus in stockholm, this getting into my recommendations feels like a targeted advertisement
Can you talk about tor guard? It managed to become court proven by refusing to give up logs to the company/companies throwing copyright lawsuits against them in regards to torrenting, and instead opting for making it so that only US servers can't torrent (but other servers can).
I'm waiting for Kenny's VPN! :))
Monero will be the only payment option and on landing page will display "connect to this site from coffee shop's wi-fi or tor" :D
What I also love also Mullvad is they don't offer huge bulk discounts like many other big providers. Most VPNs try to suck you in giving you $2-3/month deals for a 2 year plan, but a $8-10/month deal for monthly subscriptions. With Mullvad, it's 4.5 euro a month with any plan.
A Calyx Institute MiFi Hotspot ordered with a computer running Tails over a public WiFi bought with XMR shipped to a mail drop for a Wyoming LLC at a registered office ran by your attorney and forwarded to you by the attorney's office is about the most private access point you can get as an entry point to the Internet. After that connect via Tor over a VPN paid for with XMR. That is about as anonymous and private as you can get thanks to Attorney-Client privilege. Of course never put the sim into that hotspot anywhere near a location that can be associated with you.
This guy's doing the thinking for all of us. ☝️
@@joeybuddy96 For bonus points, you hire the attorney with cash and give him a psuedonym.
Using TOR over VPN is doing nothing but making latency based correlation and MITM attacks easier for them.
@@wrockd it is adding one more hop of obfuscation and adding yet another layer of fruitless investigative sourcing. The ISP doesn't know you were connected to Tor. Tor doesn't know where you are coming from, and the VPN provider only knows that you came from a mobile hotspot and went out to a Tor node. It removes single points of failure.
@@jeremyleonbarlow TOR Guards work much better for that purpose, as they mitigate that exact single point of failure that you're talking about.
VPNs are Centralised and Your ISP can figure out exactly which VPN Provider you're using just by looking at the IP, after that all it takes is an email exchange between two governments to hand over your data from that VPN company (14 eyes and 7 eyes exist). And now you've got a single entity with logs of all your activities, that's a single point of faliuee.
For obfuscating TOR usage using TOR Guard nodes is much better, they Obfuscate the traffic behaviour to look like common traffic, and by the time they get recognised/registered as TOR Guard nodes by your ISP they are already replaced.
The issue I see is no non-sketchy way of getting monero in decent amounts
Buy a good GPU and mine it.
invest in alts use interest / gains to transition into moreno
buy with cash from a P2P market
@@junosoft Actually Monero isn't mined with GPUs, it uses a cpu only algorithm.
@@Andrew-jh2bn it's minable using a GPU,albeit I wouldn't recommend it,since it doesn't make full use of the gpu
Privacy and Anonymity are completely different. Tor was compromised in 2013, users can be identified by rogue nodes and traffic staining techniques. That is why GCHQ runs a lot of Tor Nodes. The Tor Browser Bundle was altered, possibly with the agreement of the developers to assist Law Enforcement with Operation Onymous in 2014. All the default security settings were changed to the lowest level and scripts were turned on. The script feature was also left operating despite the setting being set to off/blocked in later releases - to assist further with police investigations. The way it worked was that sites run a script when a user connected and the Tor Browser Bundle firefox sent replies outside Tor, back to Law Enforcement. Certain sites were given ID numbers and once the user connected, firefox run the script and identified the real IP address of the person.
Tor Project would never answer questions over this. They also presented for download a version in November and December 2013 that had a "profiler trojan" built in, but only identifiable by Kaspersky antivirus at the time, because that company would not assist with exposing users.
Some sites had pictures and videos that were modified, so they would cause a video player or picture viewer program to call for extra resources or a CODEC. Unless you blocked this or set VLC, for example, to connect out on a random IP and Port, you would be connected to Law Enforcement and they tracked you. Other files were just remote access trojans and law enforcement just sat watching what users did.
VPNs are dangerous. RUclips affiliates only advertise them as they earn up to 40% of each referral. Most are only Proxy Servers, not VPNs. They operate on rented equipment in datacnters like M247 Ltd - who are forced to hand over all data in the UK at the request of police with a Production Order. The VPN collects, inspects, manipulates and redirects your data and sifts through to see if there is anything they can add to a user profile. Some VPNs want email addresses, phone numbers, WifI info, contact lists, PRECISE LOCATION and also your credit card details as your verified profile is sold for more.
Even if the VPN doesn't collect all your data, the Host Company can and does sell it to whoever wants it
A VPN only hides the IP, technology has moved on in the past 10years, now it is possible to trace anyone anywhere. Security Services can locate a person using facial recognition, using input from doorbells, CCTV, phones, ANPR etc. They can also tell who is with you if you are talking near a phone or alexa, or some TVs.
Nah.
The most complex 12 minute ad read I’ve ever seen. Shoutout Mullvad
Maybe Mullvad is trying to honeypot by appearing so good but they still get your ip and that is plenty
It's well proven by now, that if a well meaning company grows too big, becomes too corporate, they end up becoming the bad guys, so yeah. Although, might as well ride the wave while it's radical. 🏄♂
They are based in Sweden, which has a terrible track record for privacy.
@@MrEdrftgyuji Bro what are you on about lol
@@MrEdrftgyuji what lol
My neckbeard has long awaited the day a youtuber has mentioned mullvad with a well produced video
One could also pay for other vpn services via prepaid cards, or similar. There would have to be additional steps taken to keep your identity somewhat sterile, in registration, and use; but, it wouldn't be impossible.
I've never used a prepaid card, do you have to give your information to use it?, or can you put a random name on it?.
@@RuthlessNoise if you pay for a pre-paid card with cash then the only way the card itself can be traced back to you is if someone looks at surveillance footage and sees you buying it but even then i think there would have to be a lot of other factors coming together.
They are the best Wireguard vpn provider IMO, I have benchmarked so many VPNs and Mullvad comes out on top all the time.
Better speed and better battery life.
I don't use a vpn for privacy but I do value my privacy.... I self host my own vpn so I can take advantage of a secure wan into my own network at home. I am currently using my own self hosted openvpn and I have deployed others before as well, would be cool to see something covering how well secured those solutions tend to be and if they have some privacy issues as I wouldn't be surprised if they have some telemetry reporting services packed in. It is open source but most people including myself don't have the time to comb through all that and even if I did I am not a cyber security expert and even someone who is could miss things. happens all the time. Too me a vpn is a way to make a cheap wan.
You're here too
@@meow-iskander ..... do I know you from somewhere else?
What do you mean you self host it? And if you self host does it mean that you're doing it from your location? Doesn't it kind of defeat the purpose? Cause your location would still be known.
@@gabriel-x7x9g self hosting a vpn does add some additional protections but the goal isn't so much to do what your assuming. I can use it as a WAN solution to interact with my network and hosted content within it while remote.
I just used my latest VPN subscription to watch this video and leave this comment, I feel super safe/private/anonymous. 😇
I love how from the description alone you can infer that the ANON Phone was an obvious scam yet real criminals that operates outside the law fell for the meme, it is almost comical
it's also worth noting that it seems like if you DO pay with a method like debit card or paypal, the receipt gets yeeted in 40 days.
and you can pay with actual cash. since mail doesn't require a return address, i'd say that's pretty anonymous.
of course, they can still see your IP address and who knows when/if they get rid of it. you just have no way of actually knowing. as far as VPNs go, though, they're the best you've got.
VPN should really just be used for unlocking geo-locked content and pretty much nothing else unless you know what you are doing. Same way ISPs puke data to police/fbi/whatever other government agency VPNs will do the same and lot of them said they have no logs policy but they are apparently required to collect logs or something like that. Like only benefit I really see is if you are from country X, VPN is in country Y and country X agencies cannot request logs from company based in country Y.
9:51 I'm interested in what you think they'd do once they've caught you having information about Hillary? XD
MULLVAD FOR THE WIN!!!
Don't forget that Mullvad is open source and written in Rust, which is a language that prevents many security issues usually propagated by bugs.
In terms of running relays, you can also run multiple relays in containers instead of having to have one device per relay.
Mullvad seem to be chads. When I eventually bother getting an external VPN it will probably be these guys.
YESSSS I EMAILED THEM ASKING FOR A MONERO OPTION AND THEY DID IT
Careful. According to Kenny you're now identified since they have an email address for you.
Huh, a channel that recommends stuff without affiliate link! What kind of awsome sorcery is this!
You can also opt for an overall privacy boost of the entire Internet by obfuscation, in that case trigger red flags for nothing would be a good strategy, I mean, people are already doing that.
Don't forget that behind that frontface of everyday heroes there's a lot of creepy bastards.
Thanks, I've watched the old videos about this topic but I think I need this kind of video from time to time to remind me about how vpn sucks.
When you buy Monero on an exchange, you buy it using a debit/credit card/PayPal and you provide the exchange with your personal identifiable data.
But they just know you have, ni idea what you do with it once its moved
But the Monero blockchain is private, so as long as you don't send it directly from the exchange to whomever you're paying, there is no way to trace what you did with the moneroj.
In other words, just withdraw it from the exchange to your own wallet first, then pay anyone from there, and there's no practical way to trace that trail on the blockchain.
And for anything else you can use something like Incognito app
ruclips.net/user/incognitochain
The waifu thumbnail got me into watching your video. Although I'm in mixed bag with privacy, I'll probably use it when I move out of family house in future when living my own.
isnt mullvad located within a 14 eyes country and thus basically forced to give out your IP address, without informing you, whenever anyone wants it?
not saying nordvpn wouldnt do that, but they at least are outside the 14 eyes. While sure they need an email address one could theoretically create a throw away email using tor, and activate it by purchasing a one year gift card in some electronics store. You also seem to be able to pay with monero now, but no idea what data they want for you to be able to do so.
again, I'm not saying nordvpn is good or bad, i just dont think mullvad really is much better.
or am I missing something?
Its entirely possible mullvad is another cryptoAG jr. They have been on the nsa radar since 2009
Yes Mullvad could be completely compromised but the point of the video is that it doesn't even matter if they're compromised since they never get your information besides an IP address anyway. It means they could still be valuable to use even if the internet connection runs straight to the CIA headquarters.
Sweden has a terrible track record for privacy, as does the rest of the EU. Don't know why he keeps shilling them ($$$)
@@joey199412 I mean if they got my IP they basically got everything they need to know who I am, in which case I could have just used my credit card in the first place
@@julikaiba No. In order to even connect your IP to you, they need to have some sort of pressure on your ISP, like law enforcement. And even then mullvad would have to keep logs of what traffic exactly goes to what IP address. Then, and only then, would it matter that mullvad is in a 14 eyes country.
Been using mullvad for a long while now, love it
Algorithm hacked
MO out here doing the Lord's work. Criminally underrated channel
Is it possible to run a TOR relay on a VM in Google cloud? I've been playing with some VMs on the free level google clouds, and the bandwidth is massive, could be a good way to claw back some anonymity through the all seeing google.
yes unless they block it
I doubt they will allow tor traffic through their servers.
I don't understand why nobody is talking about Sybil Attacks in the tor network?
It's old as shit and the glowies are all up in the mix since like foreeever, how people can be so ignorant to this just blows my mind. If you want a true VPN/onion router, then either set up your own personal exit node within the lokinet network, or fork the project as everything is open source.
We don't need more relays, we need more entrance and exit nodes.
@@bravefastrabbit770 The only argument I see for Lokinet vs Tor in regards to Sybil attacks is that you have to stake Oxen to run a node. As if governments and other "bad" actors couldn't afford this?
im so glad monero is slowly gaining popularity, even one of my fave anime reviewers takes donations in monero
I don't see the problem with putting a credit card to pay for your VPN, when you connect to a server it's a single IP address that is shared with multiple other users that are also using the same connection, how could the feds directly trace it back to you?
so glad i found this channel, keep the content coming outlaw ✌
Hackers are something else, these keeps blowing my mind😮 , these incidents relating to other incidents is like a puzzle
2:41 Lol. At this point, the only way to be sure you're really anonymous, is to write the software yourself, and to design and manufacture the hardware yourself. And even then, as soon as you connect it to the internet or the mobile network, you might be able to guarantee under some circumstances that your communications are private, but you can never be sure that you're able to hide who you are and with whom you communicate.
false, the whole point of "OPEN SOURCE" is so you don't have to write the code but you're able to view it.
Just use a pen and paper
Agreed, even home routers are inspecting and collecting all your traffic. Have you noticed how many of them hide it as antivirus monitoring or traffic shield systems.
Zased! I recommend Mullvad to anyone who asks me about VPNs.
How do I not know Mental Outlaw is a FED honeypot?
I luv ur sense of humor Mental, Ur my type of person who would be fun to hangout with..
he's not gonna let you hit
@@unrule. hit what?
Honestly vpns are only useful for bypassing streaming service region locks and torrenting.
The only reasons someone would need a vpn is either 1- you are doing something illegal or 2- you live in a very restricted country that doesn't allow you to visit any social media or 3- you want to watch netflix on other regions (Which if that's your only use why are you paying for a paid vpn just use a free one)
@@SkyenNovaA but you don't have privacy when you use a vpn either you are just trusting your vpn provider instead of your isp
One question tho, is it your choice that your relay server is an end node, or an inner node? Can you choose?
If not, then wouldn't that just prove that most of the end nodes are controlled by the feds? Because if they control both the end nodes that i use (the one that my packet enters and the one that it exists), then they can easily know who is sending which packet.
And that is how it works! Exactly how you are identified using Tor, they stain the traffic going in and look for it on the exit nodes. GCHQ and NSA monitor all Tor nodes are correlate the traffic.
Thank you VPN’s for making social media Jannies seethe as i come back from another IP-ban.
It's a very, very old CCC advice: For torrenting speed mullvad, if speed isn't an issue, cryptostorm. For paranoia, a private box in romania.
What's your opinion on double VPN? Using a VPN to connect your PC, then starting a VM and connecting to another VPN. Theoretically this would obfuscate your IP address to the point of near anonymity.
Shouldn't work in theory, VMs are typically bridged to your physical adapter on your PC meaning that the traffic would both be going out from the same physical NIC and destined for two separate servers. Wouldn't be any different than running through a single VPN tunnel
@@ethanmorris36 ok yes that makes sense. What about using your VPN to connect on a VPS and then chaining with another VPN? I know this is probably bogus but I try to think of methods to achieve this. Double VPN did something similar but was cancelled by the glowies.
Mullvad VPN offers Double-Hop option. No need for VM.
@@skafiskafnjak971 but couldn't it be tracked in the same sense as any other VPN even with double hop?
@@ElectronNDubstep it can be tracked obviously, but it will take much more time & effort. you'll be tracked even if you use VM. encrypt your PC with veracrypt and use doublehop vpn, that's the best thing you can do.
If I ever became pres, I'd try to convince you to be one of my councelors.
The government can send CP to your TOR relay then charge you with distribution
Tor IS the 🍯
um sweetie how would they get CP to send in the first place? it's illegal 🤓
@@ainzooalgown9952 I doubt what the OP is saying is true, but to be fair it's irrelevant to them; whethever it's illegal or not. The feds broke law before
@@ainzooalgown9952 from their large cache they call "evidence" or "forfeited property"
@@karolbomba6704 oh it's true. Whether it's practical or if the charges would stick is irrelevant - you are responsible for all traffic through that Tor Relay. Running a device that accepts CP from one user and sends it to another is still a violation of CP laws
CP was just an example
@@ainzooalgown9952 a user like you downloads a Tor Relay - then gets trapped by the feds. You then agree to continue running your relay as an informant to keep yourself out of trouble - you refuse? You go to jail to await trial while the government continues to run your relay
Tor is the worst opsec
I think this is one of the best Produktplacements in the world.
VPN's are hiding your IP from the sites you visit, I think it's the most important part. If you don't want to hide from feds, but want to avoid getting tracked by Google and other sites, pretty much any VPN will do the job.
In this sense, any VPN is anonymous, because it blends you with other people that use that VPN service (of course VPN service itself can see which sites you visit, but only domain names, 99.99% of traffic is HTTPS)
Google and big corp can still track you with cookies and JS. Look up digital fingerprint.
and as dr here points out, your browser, supercookies, settings, uids, etc will let them track you anyways. if there was any chance that vpns would hurt big techs advertising income they wouldn't be allowed to exist and they certainly wouldn't allow adverts for them on their platforms lmao
the only way to hide from the feds is to either not exist or be such a generic rule-loving normie that your daily twelve terabytes of data never get looked at because you not only had nothing to hide and did nothing wrong but you were also extremely boring and constantly emitted drool from the mouth like a good little puppet :D
ONLY your IP is hidden, Google and others still know exactly who you are from many different ways. Cookies, supercookies, canvas fingerprinting, browser and device fingerprinting, the way you type, what you look at, what you do online etc.
Technology has changed, so a VPN is not protecting people.
Most will connect to youtube via a VPN, log-in with their Google account and wonder how they were traced!!!
Using Tails Live system USB on public computers in cafe, library is also a good option.
sacrificing the luxury of your basement 😂
High power aerial connected to a distant hacked WiFi. That would be highly illegal though 😡
If you can connect to a distant Wifi you can just find a café or store that has open customer wifi. ;)
@@Ooooooooooo But then you wouldn't be a leet hacker outlaw supervillain.
@@Ooooooooooo Anywhere with public WiFi will have cameras.
Remember one thing, all these VPN servers are in different countries around the world with different laws. Most are contracted datacenters that have their own rules and regulations
If it is in the UK like M247 Ltd, then all your data can be turned over to police and security services. Unfortunately Mullvad has servers located in their datacenter.
Would love to see a project where you use the mullvad/tor combo
Don't use tor and vpn together
@@Assault_Butter_Knife can you explain why not?
Funny thing I got the Express VPN Ad on this video
lmao port forwarding removed, rip mullvad
Just switched to mullvad, thanks to the content bro!
you're really gonna gloss over how based it is that they accept cold hard cash by mail
That's kinda worse than using BTC. You'll have to take extra steps and even then the government or postal service can find out a lot about you.
@@Basement-Science Extra steps like sending a letter without a return address or using a fake address?
Get an envelope, sufficient stamps, fill out the details for the recipient, leave the return address blank or enter a fake address, insert cash and payment token number, then pop it into a postal collection point.
If you're extra paranoid, handle everything with gloves, obscure your appearance and do so at night, to avoid CCTV identification.
Not sure how the postal service can find out who this person is.
@@Basement-Science PS, if serial numbering stamps became a common practice, or otherwise adding obscure but identifiable marks within the stamp imagery, along with serialised barcodes at Point of Sale to marry the stamp set to the purchaser (banking details or CCTV footage in the case of a cash sale), then I could see this avenue of anonymity being stamped out (ugh, sorry, pun not intended).
@@beardymcbeardface69 Yes, you'll have to go full paranoia mode and the postal service still knows where you deposited the letter, roughly when, who you sent it to and potentially if you did so repeatedly. (correlate letters going to the recipient with CCTV footage of people sending those letters.) Additionally the letters can be inspected in transit, can get lost without your knowledge (or claimed to be, by the recipient, or someone who steals it) etc.
With BTC used with good privacy precautions (send transactions through TOR etc), the most significant thing people can find out is where your money came from (for example where you bought it) and where you sent it (which can be a new, unknown address each time)
In the end one is not strictly more private than the other, they are just different. And of course most people use neither approach with maximum privacy anyway.
@@Basement-Science "the postal service still knows where you deposited the letter, roughly when, who you sent it to and potentially if you did so repeatedly"
Yes but the _"you"_ is unknown at this point. A person this paranoid should not be repeatedly using the same mail collection point and ought to be paying yearly to reduce their collection point visits. This person who is so paranoid, should also accept the risk of their payment being lost, since they are going to such extraordinary lengths to try to be anonymous.
Currently using IVPN, in my opinion the only true competition to mullvad VPN. Both don't require email and phone number for using the service, both offer 1 month membership and longer.
I believe ivpn has similar features might be good if you are looking to avoid some x number of eyes act
Except don't cos they're based in Gibraltar which is far too cozy with UK/Spain
I've never heard about the Anom phone but it sounds super funny, extremely intelligent, and scary.