Gap
Advanced
- Joined
- 14.09.20
- Messages
- 137
- Reaction score
- 1,265
- Points
- 93
Greetings friends. Today we will talk about a very old and hackneyed topic, namely, VPN. About the role of this tool in building Your personal security. I will try to be brief and to the point, without any unnecessary words. What is a VPN, what does it do (or what doesn't) You probably already know. If for some reason not, then go to DuckDuckGo — Privacy, simplified. and we're looking for it. There's plenty of information.
When we prepare our PC for safe operation and it comes to VPN, we usually have 3 ways:
Before we start, it will be good if you understand the obvious points:
The VPN provider doesn't know what happens to the traffic at all if You connect to a VPN before Tor. Just like it doesn't know about Your existence if you connect to a VPN after Tor. The only caveat that may arise is the price.
However, you can purchase brute VPN accounts (with a guarantee).) with us. This will significantly reduce possible expenses on Your part.
What is the conclusion?
A commercial VPN can only be used as a part, a small cog in Your security system that performs only the role assigned to it.
When we prepare our PC for safe operation and it comes to VPN, we usually have 3 ways:
- Raise a VPN yourself on a rented VPS purchased with cryptocurrency
- Use the services of a commercial provider
- Use the services of a free provider
Before we start, it will be good if you understand the obvious points:
- Absolutely all providers store logs. Some people store more information for a longer period of time, while others, on the contrary, collect less data and store it for a shorter period of time. But this is done by everyone without exception, there is no provider that does not store logs at all. Every last one of them! If they try to convince You otherwise, then this is, of course, cunning.
- No merchant (this applies not only to VPN providers) will put Your interests above the interests of their own business. More precisely — if the refusal to issue your data at the request of the competent authorities will mean any inconvenience or, God forbid, losses for business, Then you will be handed over. No one will think long.
- Despite the 2 points above, you should make allowances for geography (not only for faster connection), but also for the political climate. A rough example : If Your activity is connected, for example, with the Russian Federation, then you should exclude the use of services from Germany, since there is a bilateral agreement on cooperation and mutual extradition of suspects in the field of cybercrime. Perhaps, if we are talking about the Russian Federation, then we should look in the direction of countries that do not have the most rosy relations with the Russian Federation. In General, the vast majority of European providers are very reluctant to respond to any requests from the CIS authorities at all. The most win — win option is the Netherlands, Switzerland, Gibraltar, Czech Republic, Greece and others. It is also worth mentioning inter-European treaties and cooperation within their framework, such as the Alliance of five, nine and 14 eyes, if your activities affect EU and US countries
The first option is your own VPN on a VPS
View hidden content is available for registered users!
The VPN provider doesn't know what happens to the traffic at all if You connect to a VPN before Tor. Just like it doesn't know about Your existence if you connect to a VPN after Tor. The only caveat that may arise is the price.
However, you can purchase brute VPN accounts (with a guarantee).) with us. This will significantly reduce possible expenses on Your part.
What is the conclusion?
A commercial VPN can only be used as a part, a small cog in Your security system that performs only the role assigned to it.