What are some decent VPN services? Obviously TOR remains superior for anonymity, but for general purpose and high speed internet usage what's your best bet? I've been using mullvad for a few years and while it's consistent, it's consistently mediocre. It will often drop the connection briefly once every hour or so which can be quite a bother if streaming videos.
This thread should only be about VPNs which allow 100% anonymous payment. Only Mullvad and I think Cryptostorm accomodate this. Mullvad you can literally mail them a folder full of cash, doesn't get much better than that.
>>971 >mail them a folder full of cash
Sounds pretty good. But what's the point of using a VPN anyway? The feds can always force them to log your real IP. Either tor or nothing with me.
>>972 Learn how to tunnel connections through each other until you're behind 7 proxies. You shouldn't use a lone VPN for anything more than torrenting and benign shitposting.
>behind 7 proxies
3 hops of tor to reach the VPN. Then from the VPN connect through 3 hops of tor again. Then connect to the website you want through that tor connection.
Bam, le 7 proxies maymay fulfilled. download speed 10kbps, latency 10s
>>972 Like the OP says, high speed internet. Plus there are instances where some VPN services have been taken to court and physically proven that they don't keep any records, unsure if this has occurred with cryptostorm or mullvad though.
>>946 >They are only useful for ban evasion on 8chode.
Nonsense! Cutting your ISP out of the datamining loop is reason enough to always use one. If nothing else, extensive use of Tor will be much less obvious to local authorities and the vpn might end up a failsafe in the event some future Tor Browser vulnerability ends up revealing the user's connecting IP.
>Obviously TOR remains superior for anonymity, but for general purpose and high speed internet usage what's your best bet?
for general purpose, Tor is superior
for high speed internet usage, Tor is superior
>I've been using mullvad for a few years and while it's consistent, it's consistently mediocre.
then stop using it idiot and buy Tor
>It will often drop the connection briefly once every hour or so which can be quite a bother if streaming videos.
never happens on Tor and it's free
>>971 >This thread should only be about VPNs which allow 100% anonymous payment.
no such thing. any existing payment method leaves evidence. Tor doesn't as it's free
>Only Mullvad and I think Cryptostorm accomodate this. Mullvad you can literally mail them a folder full of cash, doesn't get much better than that.
cryptocurrencies are not anonymous
mailing a cash is not anonymous, it will leak from where you sent it, it will leave your body parts on cash
>>981 >3 hops of tor to reach the VPN. Then from the VPN connect through 3 hops of tor again.
what's the point of that?
>download speed 10kbps, latency 10s
false. with such setup, download speed would be at least few Mbits, latency maybe 1-3 seconds
>>982 >Like the OP says, high speed internet.
Tor offers high speed internet
>Plus there are instances where some VPN services have been taken to court and physically proven that they don't keep any records, unsure if this has occurred with cryptostorm or mullvad though.
show evidence
even if this was true, by using VPN you are gambling whether your shit VPN logs much or not
>>990 >he can't afford $10/mo for a romanian vps
that's even dumber than VPN
>Cutting your ISP out of the datamining loop is reason enough to always use one.
cutting ISP from datamining only to let your VPN datamine you?
Tor doesn't let anyone datamine you
>If nothing else, extensive use of Tor will be much less obvious to local authorities
Tor bridges can be used for that
>and the vpn might end up a failsafe in the event some future Tor Browser vulnerability ends up revealing the user's connecting IP.
VPN will do shit for that. they will get your VPN IP instead of home IP. getting home IP will be trivial, they will just ask VPN provider for it
if you want to protect from that, you can use Whonix virtual machine https://whonix.org
>>6468 >Tor bridges can be used for that
Let's not overstate their effectiveness. Some countries are already savvy to bridges, and it's likely more than a few others are too and only pretend to not notice that these are actually tor connections.
Most VPN providers are surely garbage, but if you want to look more like a streaming normalfag rather than a tor user from the outset it's not a bad way to go.
>>6473 >Your own server with OpenIKED.
dumb. you will be the only user of that "VPN"
>Some are. Zcash and DASH are examples.
1. I don't know any VPN provider that accept those
2. how will you get those cryptocurrencies in anonymous way? if you don't, then you will be marked as zcash/dash user and there is not many of them, so any purchase with zcash/dash can be linked to this small group
>>6483 >I don't know any VPN provider that accept those
I can think of at least three, but I suppose it doesn't matter what "VPN shills" think.
>how will you get those cryptocurrencies in anonymous way?
Buy with local provider. You can get pretty close to anonymous payment with something like LocalMonero and paying cash, for example. Or do something similar with Bitcoin and then buy zcash/dash/etc on an exchange. You always have options.
>>6492 >I can think of at least three, but I suppose it doesn't matter what "VPN shills" think.
even if it was possible to buy VPN anonymously, what is the point when you use your IP address registered to you to connect to VPN?
>Buy with local provider. You can get pretty close to anonymous payment with something like LocalMonero and paying cash, for example.
doesn't such sites require a phone number?
>Or do something similar with Bitcoin and then buy zcash/dash/etc on an exchange. You always have options.
exchanges will know the details of exchange, but maybe that's not a big problem if my name is not connected to bitcoins I used in trade
>>6512 >even if it was possible to buy VPN anonymously, what is the point when you use your IP address registered to you to connect to VPN?
I was only answering the question, but I happen to agree unless you're connecting to your anonymously paid VPN through Someone Else's Network (public wifi away from home, Tor, etc) the benefits of going this route are mostly dubious. Most providers make no attempt to sever the link between payment and the account being paid for, and it's probably a game of russian roulette to put your faith in the ones who do: even completely honorable and competent staff need only to come to work a little groggy and fuck up a little to compromise users, and I think most people should keep this in mind even if they trust their provider.
>doesn't such sites require a phone number?
Some (including LocalBitcoins) do, others (including LocalMonero) do not. I'm noticing that the Bitcoin landscape became increasingly locked down over the past year in most locales, and I think the time to move onto something other than Bitcoin is "yesterday".
There is no “decent” VPN service. If you don't understand that it's a business of making money on people who can't configure the most simple remote server to tunnel their traffic, you shouldn't post here.
In case you live in a country that was lobbied to legalize mass targeting of torrent users, you can use anything that works with an endpoint in one of the least cooperative countries to yours. Keep in mind that you should only bind the torrent client to a virtual interface, as all of these snake oil salesmen are eager to grab all of your traffic to spy on it, and sell the data on advertisement/user behavior market.
So I was about to run my own private OpenVPN server instance on a dedicated server I'm renting. Can anyone tell me why this might be a bad option? I guess I don't understand why more people don't run their own private VPN servers and setup a small LLC for them. Even if you are the only customer, they will still send the subpoena to your company for logs and you will know ahead of time. This seems to be an extremely optimal solution, even moreso if you have 10-20 customers.
>>6550 >So I was about to run my own private OpenVPN server instance on a dedicated server I'm renting. Can anyone tell me why this might be a bad option?
you will be the only user, the only IP that connect to your VPN. it is obvious that all actions performed by your VPN are performed by you
>I guess I don't understand why more people don't run their own private VPN servers and setup a small LLC for them.
because that is a lot of work and result is still shit
also
>starting your own fucking company just to try to be anonymous on the internets
>instead of just installing Tor Browser which is superior to your stupid setup
>Even if you are the only customer, they will still send the subpoena to your company for logs and you will know ahead of time.
so what? what will that knowledge give you? if you do crime from your "vpn" you will get to jail. if you do crime from Tor, nothing will happen
>This seems to be an extremely optimal solution, even moreso if you have 10-20 customers.
if you have 10-20 customers they will order you to tell who it was, or just read it using Intel hardware backdoors in your servers
or they will blackmail you
For OS, I normally recommend OpenBSD, but Alpine is also fine if the VPS doesn't support *BSD images.
>Can anyone tell me why this might be a bad option?
If you need a VPN, that's the best you can do. This is not a bad option.
Tor is better for anonymity, but it doesn't support UDP (necessary for bittorrent and some online games) and is slow. Always use Tor when possible, though.
>why more people don't run their own private VPN
Because it requires some expertise. You need to pay for a VPS and do all the setup yourself.
>they will still send the subpoena to your company
The traffic will be encrypted. If you get a VPS with support for custom OS images, disable the system logs and encrypt the volume, the only way they could get the logs would be by penetrating your system. They can do that as VPS is normally virtualized (unless it's a "dedicated server", which is very expensive), but most companies won't put a backdoor on every system, it's just unfeasible.
I'm assuming you're using a good company, such as Vikings.net, 1984.is, Flokinet.is or Netcup.de.
>>6561 >Intel hardware backdoors in your servers
That's conspiracy theory. We know that Intel processors is very bugged and most probably have backdoors. But law enforcement won't use those backdoors unless you're a high priority target.
>>6583 >Tor is better for anonymity, but it doesn't support UDP (necessary for bittorrent and some online games)
UDP is not necessary for bittorrent
run torrent client inside Whonix VM https://whonix.org (because torrent clients are shit and leak IP so VM is necessary), add torrent or magnet, add http trackers manually
>and is slow.
false, Tor is very fast, fast as in bandwidth. latency isn't bad unless you are doing voice calls, but even then it can be tolerable
>The traffic will be encrypted. If you get a VPS with support for custom OS images, disable the system logs and encrypt the volume, the only way they could get the logs would be by penetrating your system.
they don't need logs, they already know you connect to this VPS with VPN protocol and that you own this VPS, they can assume all outside actions made by this VPS are made by you
>but most companies won't put a backdoor on every system, it's just unfeasible.
[citation needed]
>That's conspiracy theory. We know that Intel processors is very bugged and most probably have backdoors. But law enforcement won't use those backdoors unless you're a high priority target.
Intel Management Engine is a separate CPU inside your CPU which is not under control of your OS, it has it's own closed OS. it has access to all devices, RAM, networking. it's purpose is unknown (officially)
it is definition of backdoor
>>6588 >run torrent client inside Whonix
You shouldn't torrent with Tor.
>add http trackers manually
Yeah, like you will do that for every torrent you download.
And even if you do, you shouldn't use Tor for that.
>Tor is very fast
No, it's not. It sure is fast enough for me, but you can't call 500kb/s "fast" when people have optical fiber cables now.
>they already know you connect to this VPS
For the servers you're connecting to they will only see the VPS address.
Only law enforcement and the VPS provider would have the information of who's connecting to the VPN.
I never said VPN is anonymous, btw. As I said above, use Tor for whenever possible.
>[citation needed]
As I said above, I was assuming you're using a good provider that allows you to put custom OS images (.iso). They won't modify all .iso files on-the-fly as you load it. This is not feasible. Different systems have different directory structures.
>Intel Management Engine
This is well known here, you don't need to be so pedantic.
What I said was a conspiracy theory was your idea that law enforcement would use Intel ME as a backdoor on some random guys VPN. This won't happen. They will only use it in high-profile criminals.
>>6592 >You shouldn't torrent with Tor.
the discussion was if it is possible to torrent over Tor, not if you should or not. but I disagree with you, you should torrent over Tor, no reasons not to
if you say using torrents consumes a lot of Tor network bandwidth, this is not true, just don't download stupid jewish movies and dramas everyday like goyim do. files on torrent can be small or big. some files on torrent are leaks obtained by hacking, you should download such stuff over Tor. or child pornography
>Yeah, like you will do that for every torrent you download.
of course, where is the problem? it's a few clicks
>And even if you do, you shouldn't use Tor for that.
no reasons not to use Tor for that, only benefits
>No, it's not. It sure is fast enough for me, but you can't call 500kb/s "fast" when people have optical fiber cables now.
you mean 500kb/s as 500kbit/s (62.5kB/s) or 500 KBytes/s (3.9Mbit/s)? if the first, this is false. if the second, this is fast, very fast. I don't see any reasons why would 95% of people need more than that
I don't give a fuck dumb normal niggers have pointless optical fiber, as it's not needed for anything
>For the servers you're connecting to they will only see the VPS address.
>Only law enforcement and the VPS provider would have the information of who's connecting to the VPN.
that's enough. one bad action or "hate speech" and they jail you.
also, VPN are inferior in many other ways to Tor. with this stupid VPN setup, you will get same IP address for every website you visit, so the jews and cloudflare will easily track you, know that this is single person.
>I never said VPN is anonymous, btw. As I said above, use Tor for whenever possible.
whenever possible can mean always. if something doesn't support Tor, either don't use it or add proxy after Tor
>As I said above, I was assuming you're using a good provider that allows you to put custom OS images (.iso). They won't modify all .iso files on-the-fly as you load it. This is not feasible. Different systems have different directory structures.
They don't need to. they have hardware backdoors, they can read and write your RAM, they can later add backdoors to your OS (after it's installed)
>What I said was a conspiracy theory was your idea that law enforcement would use Intel ME as a backdoor on some random guys VPN. This won't happen. They will only use it in high-profile criminals.
we don't know when they use it and when they don't. also, eventually everybody can become high-profile
it is best to assume all backdoors will be used against you and not have them
>the second, this is fast, very fast.
No, it's not. Try to download a 4GB movie at this speed. This is speed is enough for most of us anons, but not for most people that work with heavy files (such as videos and photography).
>pointless optical fiber, as it's not needed for anything
You never worked with a very big amount of data, then. Optical fiber is not used just by normies to get into facebook. It's used for connection in very big data processing servers, such as those used by CERN for scientific calculations.
>VPN are inferior in many other ways to Tor.
You need to learn text interpretation again, anon. I've said two times before I'm not recommending VPN against Tor.
Tor is clearly a much better solution for privacy.
>they can read and write your RAM, they can later add backdoors to your OS
You clearly don't understand how a VPS company works. This is not feasible to do. Of course they can do that, as they have physical access to the hardware. But most companies can't even use KVM right, let alone implant backdoors on custom strangers systems.
I would agree with you if you use the image provided by the VPS company, such as preinstalled Debian or Ubuntu. But if you install a custom .iso file, try probability of they installing a backdoor is near null.
>it is best to assume all backdoors will be used against you and not have them
That's the right mentality, but we don't have alternatives yet to Intel/AMD/ARM-SoC.
>>6607 >You never worked with a very big amount of data, then. Optical fiber is not used just by normies to get into facebook. It's used for connection in very big data processing servers, such as those used by CERN for scientific calculations.
Which is not the majority of Tor use case you dickfuck. Optical consumer networks are so normalfags can get slightly upgraded products so they can browse their shit tier websites with sub-second latencies. All the while calling anyone a poorfag if they insult such websites.
>>6611 Not a alternative. Most software doesn't run on POWER9 and OS support is poor. Also, this is not cheap as it's meant for servers. Most people can't afford this and it also consumes a lot of energy.
>>6615 >not the majority of Tor use case
And how do you know that? My comment was just a example. I had to download big files over Tor and it was not fun to wait almost 24 hours for it to complete.
Most people will not need fast connection, but you can't call Tor "fast". It's just not and it can't be, as the node vary the bandwidth and latency.
>>6620 Many security features are lacking on POWER. For example, some features in GRsecurity:
https://grsecurity.net/faq.php#arches FreeBSD is only initially ported. OpenBSD doesn't even support POWER anymore.
IBM released OpenPOWER mostly because it's a dead architecture. x86_64 and ARM64 dominates the market and less operating systems are caring about POWER9 now.
>Seems like most CLI programs should work fine
For servers, probably yes. Software like Apache, mysql, etc. I don't know if Tor and TBB works in TALOS yet...
Don't get me wrong, Raptor is doing a great work. But in my opinion these capable people are using their efforts in the wrong ISA.
What are some decent VPN services? Obviously TOR remains superior for anonymity, but for general purpose and high speed internet usage what's your best bet? I've been using mullvad for a few years and while it's consistent, it's consistently mediocre. It will often drop the connection briefly once every hour or so which can be quite a bother if streaming videos.