/g/ - Technology

install openbsd

[Make a Post]
[X]





Nanonymous No.935 [D][U][F][S][L][A][C] >>946
File: a5f873c317e14c7d76329f109df47b24da3b77065a463483c56a3813def5526e.png (dl) (51.40 KiB)

What are some decent VPN services? Obviously TOR remains superior for anonymity, but for general purpose and high speed internet usage what's your best bet? I've been using mullvad for a few years and while it's consistent, it's consistently mediocre. It will often drop the connection briefly once every hour or so which can be quite a bother if streaming videos.

Nanonymous No.946 [D] >>6460

>>935
VPN services are not for anything secure. They are only useful for ban evasion on 8chode. You can just restart your router instead.

Nanonymous No.954 [D] >>970

cryptostorm. They seem like they actually know wtf they're doing, just check out the comments in their configs @ https://cryptostorm.is/configs/
They've also got a .onion for that site at http://stormgm7blbk7odd.onion/ and a v3 .onion at http://stormwayszuh4juycoy4kwoww5gvcu2c4tdtpkup667pdwe4qenzwayd.onion/ and an I2P eepsite at http://cryptostorm.i2p/

Nanonymous No.969 [D] >>970

>that 404 page

Nanonymous No.970 [D]

>>969
Meant for >>954

Nanonymous No.971 [D] >>972 >>6468

This thread should only be about VPNs which allow 100% anonymous payment. Only Mullvad and I think Cryptostorm accomodate this. Mullvad you can literally mail them a folder full of cash, doesn't get much better than that.

Nanonymous No.972 [D] >>980 >>982

>>971
>mail them a folder full of cash
Sounds pretty good. But what's the point of using a VPN anyway? The feds can always force them to log your real IP. Either tor or nothing with me.

Nanonymous No.980 [D]

>>972
Learn how to tunnel connections through each other until you're behind 7 proxies. You shouldn't use a lone VPN for anything more than torrenting and benign shitposting.

Nanonymous No.981 [D] >>983 >>6468

>behind 7 proxies
3 hops of tor to reach the VPN. Then from the VPN connect through 3 hops of tor again. Then connect to the website you want through that tor connection.
Bam, le 7 proxies maymay fulfilled. download speed 10kbps, latency 10s

Nanonymous No.982 [D] >>6468

>>972
Like the OP says, high speed internet. Plus there are instances where some VPN services have been taken to court and physically proven that they don't keep any records, unsure if this has occurred with cryptostorm or mullvad though.

Nanonymous No.987 [D][U][F] >>989 >>6456
File: a39979fcd62bc6cd15bfc9314866d93b309de7dc71b24dca121e38b1ea18caf6.jpg (dl) (1.72 MiB)

>he doesn't run a tor relay (at least)

Nanonymous No.989 [D][U][F]
File: 6fb4b18d00b15929822fc6eb27b77d72e50ded3da46ca8ea1c8ad142de3ef6bf.png (dl) (27.97 KiB)

>>987
I don't have enough internets or enough computer to do that.

Nanonymous No.990 [D][U][F] >>6468
File: 52e16d68c344d2f55b45a9efae8702dc387e2a24a0f527aa9e65ca3bd018269c.jpg (dl) (231.29 KiB)

>he can't afford $10/mo for a romanian vps

Nanonymous No.994 [D]

990
That's what the intelligence community is for, silly Billy.

Nanonymous No.5281 [D] >>6609
TorrentFreak does a review thing every year.

RiseUp is run by commies.

Boxpn seems okay.

Nanonymous No.5282 [D]
This list, which ironically has the same thumbnail as OP:
https://coindoo.com/top-vpn-services-that-accept-payments-in-cryptocurrency/

That list plus Boxpn which even accepts Monero apparently.

Nanonymous No.6454 [D]
What about free vpns that can be set up on whonix so you can get a Tor -> VPN setup going to get around retarded sites that block Tor?

Nanonymous No.6456 [D]
>>987
Why are you posting a gun that has no magazine in it?

Nanonymous No.6459 [D]
AirVPN is also a good bet imo. They accept a plethora of cryptocurrency, and seem more principled than most providers.

Nanonymous No.6460 [D][U][F] >>6468
File: e72f6dd645b435896939152f24c3d1c53024eefbbf7b72625f6f8a95bded9a51.png (dl) (149.29 KiB)
>>946
>They are only useful for ban evasion on 8chode.
Nonsense! Cutting your ISP out of the datamining loop is reason enough to always use one. If nothing else, extensive use of Tor will be much less obvious to local authorities and the vpn might end up a failsafe in the event some future Tor Browser vulnerability ends up revealing the user's connecting IP.

Have fun but stay safe, friends.

Nanonymous No.6467 [D]
>What are some decent VPN services?
none

>Obviously TOR remains superior for anonymity, but for general purpose and high speed internet usage what's your best bet?
for general purpose, Tor is superior
for high speed internet usage, Tor is superior

>I've been using mullvad for a few years and while it's consistent, it's consistently mediocre.
then stop using it idiot and buy Tor

>It will often drop the connection briefly once every hour or so which can be quite a bother if streaming videos.
never happens on Tor and it's free

Nanonymous No.6468 [D] >>6471
>>971
>This thread should only be about VPNs which allow 100% anonymous payment.
no such thing. any existing payment method leaves evidence. Tor doesn't as it's free

>Only Mullvad and I think Cryptostorm accomodate this. Mullvad you can literally mail them a folder full of cash, doesn't get much better than that.
cryptocurrencies are not anonymous
mailing a cash is not anonymous, it will leak from where you sent it, it will leave your body parts on cash

>>981
>3 hops of tor to reach the VPN. Then from the VPN connect through 3 hops of tor again.
what's the point of that?

>download speed 10kbps, latency 10s
false. with such setup, download speed would be at least few Mbits, latency maybe 1-3 seconds

>>982
>Like the OP says, high speed internet.
Tor offers high speed internet

>Plus there are instances where some VPN services have been taken to court and physically proven that they don't keep any records, unsure if this has occurred with cryptostorm or mullvad though.
show evidence
even if this was true, by using VPN you are gambling whether your shit VPN logs much or not

>>990
>he can't afford $10/mo for a romanian vps
that's even dumber than VPN

>>6460
>Nonsense!
fuck off, VPN shill

>Cutting your ISP out of the datamining loop is reason enough to always use one.
cutting ISP from datamining only to let your VPN datamine you?
Tor doesn't let anyone datamine you

>If nothing else, extensive use of Tor will be much less obvious to local authorities
Tor bridges can be used for that

>and the vpn might end up a failsafe in the event some future Tor Browser vulnerability ends up revealing the user's connecting IP.
VPN will do shit for that. they will get your VPN IP instead of home IP. getting home IP will be trivial, they will just ask VPN provider for it
if you want to protect from that, you can use Whonix virtual machine https://whonix.org

Nanonymous No.6470 [D]
>they think any capitalist pig will risk his business and profits, instead of selling them to police

Nanonymous No.6471 [D]
>>6468
>Tor bridges can be used for that
Let's not overstate their effectiveness. Some countries are already savvy to bridges, and it's likely more than a few others are too and only pretend to not notice that these are actually tor connections.

Most VPN providers are surely garbage, but if you want to look more like a streaming normalfag rather than a tor user from the outset it's not a bad way to go.

Nanonymous No.6473 [D] >>6483
Your own server with OpenIKED.

/thread.
>>6469
>cryptocurrencies are not anonymous
Some are. Zcash and DASH are examples.

Nanonymous No.6483 [D] >>6492
>>6473
>Your own server with OpenIKED.
dumb. you will be the only user of that "VPN"

>Some are. Zcash and DASH are examples.
1. I don't know any VPN provider that accept those
2. how will you get those cryptocurrencies in anonymous way? if you don't, then you will be marked as zcash/dash user and there is not many of them, so any purchase with zcash/dash can be linked to this small group

Nanonymous No.6492 [D] >>6512
>>6483
>I don't know any VPN provider that accept those
I can think of at least three, but I suppose it doesn't matter what "VPN shills" think.
>how will you get those cryptocurrencies in anonymous way?
Buy with local provider. You can get pretty close to anonymous payment with something like LocalMonero and paying cash, for example. Or do something similar with Bitcoin and then buy zcash/dash/etc on an exchange. You always have options.

Nanonymous No.6512 [D] >>6537
>>6492
>I can think of at least three, but I suppose it doesn't matter what "VPN shills" think.
even if it was possible to buy VPN anonymously, what is the point when you use your IP address registered to you to connect to VPN?

>Buy with local provider. You can get pretty close to anonymous payment with something like LocalMonero and paying cash, for example.
doesn't such sites require a phone number?

>Or do something similar with Bitcoin and then buy zcash/dash/etc on an exchange. You always have options.
exchanges will know the details of exchange, but maybe that's not a big problem if my name is not connected to bitcoins I used in trade

Nanonymous No.6525 [D] >>6539
>some faggot bumped this actual year old thread to shill some homosexual VPN company du jour

Nanonymous No.6537 [D]
>>6512
>even if it was possible to buy VPN anonymously, what is the point when you use your IP address registered to you to connect to VPN?
I was only answering the question, but I happen to agree unless you're connecting to your anonymously paid VPN through Someone Else's Network (public wifi away from home, Tor, etc) the benefits of going this route are mostly dubious. Most providers make no attempt to sever the link between payment and the account being paid for, and it's probably a game of russian roulette to put your faith in the ones who do: even completely honorable and competent staff need only to come to work a little groggy and fuck up a little to compromise users, and I think most people should keep this in mind even if they trust their provider.
>doesn't such sites require a phone number?
Some (including LocalBitcoins) do, others (including LocalMonero) do not. I'm noticing that the Bitcoin landscape became increasingly locked down over the past year in most locales, and I think the time to move onto something other than Bitcoin is "yesterday".

Nanonymous No.6539 [D]
>>6525
>some faggot thinks we need running narration to interpret this thread

Nanonymous No.6545 [D]
There is no “decent” VPN service. If you don't understand that it's a business of making money on people who can't configure the most simple remote server to tunnel their traffic, you shouldn't post here.

In case you live in a country that was lobbied to legalize mass targeting of torrent users, you can use anything that works with an endpoint in one of the least cooperative countries to yours. Keep in mind that you should only bind the torrent client to a virtual interface, as all of these snake oil salesmen are eager to grab all of your traffic to spy on it, and sell the data on advertisement/user behavior market.

Nanonymous No.6550 [D] >>6557 >>6561 >>6583
So I was about to run my own private OpenVPN server instance on a dedicated server I'm renting. Can anyone tell me why this might be a bad option? I guess I don't understand why more people don't run their own private VPN servers and setup a small LLC for them. Even if you are the only customer, they will still send the subpoena to your company for logs and you will know ahead of time. This seems to be an extremely optimal solution, even moreso if you have 10-20 customers.

Nanonymous No.6557 [D]
>>6550
It's a bad option if you think this helps make your traffic anonymous. I doubt most here do.

Nanonymous No.6561 [D] >>6583
>>6550
>So I was about to run my own private OpenVPN server instance on a dedicated server I'm renting. Can anyone tell me why this might be a bad option?
you will be the only user, the only IP that connect to your VPN. it is obvious that all actions performed by your VPN are performed by you

>I guess I don't understand why more people don't run their own private VPN servers and setup a small LLC for them.
because that is a lot of work and result is still shit
also
>starting your own fucking company just to try to be anonymous on the internets
>instead of just installing Tor Browser which is superior to your stupid setup

>Even if you are the only customer, they will still send the subpoena to your company for logs and you will know ahead of time.
so what? what will that knowledge give you? if you do crime from your "vpn" you will get to jail. if you do crime from Tor, nothing will happen

>This seems to be an extremely optimal solution, even moreso if you have 10-20 customers.
if you have 10-20 customers they will order you to tell who it was, or just read it using Intel hardware backdoors in your servers
or they will blackmail you

Nanonymous No.6583 [D] >>6588
>>6550
OpenVPN uses TLS. Use IPsec or WireGuard Protocol instead. I recommend OpenIKED, WireGuard, Glorytun or dsvpn:
https://www.openiked.org/
https://www.wireguard.com/
https://github.com/angt/glorytun
https://github.com/jedisct1/dsvpn

For OS, I normally recommend OpenBSD, but Alpine is also fine if the VPS doesn't support *BSD images.

>Can anyone tell me why this might be a bad option?
If you need a VPN, that's the best you can do. This is not a bad option.
Tor is better for anonymity, but it doesn't support UDP (necessary for bittorrent and some online games) and is slow. Always use Tor when possible, though.
>why more people don't run their own private VPN
Because it requires some expertise. You need to pay for a VPS and do all the setup yourself.
>they will still send the subpoena to your company
The traffic will be encrypted. If you get a VPS with support for custom OS images, disable the system logs and encrypt the volume, the only way they could get the logs would be by penetrating your system. They can do that as VPS is normally virtualized (unless it's a "dedicated server", which is very expensive), but most companies won't put a backdoor on every system, it's just unfeasible.
I'm assuming you're using a good company, such as Vikings.net, 1984.is, Flokinet.is or Netcup.de.

>>6561
>Intel hardware backdoors in your servers
That's conspiracy theory. We know that Intel processors is very bugged and most probably have backdoors. But law enforcement won't use those backdoors unless you're a high priority target.

Nanonymous No.6588 [D] >>6592
>>6583
>Tor is better for anonymity, but it doesn't support UDP (necessary for bittorrent and some online games)
UDP is not necessary for bittorrent
run torrent client inside Whonix VM https://whonix.org (because torrent clients are shit and leak IP so VM is necessary), add torrent or magnet, add http trackers manually

>and is slow.
false, Tor is very fast, fast as in bandwidth. latency isn't bad unless you are doing voice calls, but even then it can be tolerable

>The traffic will be encrypted. If you get a VPS with support for custom OS images, disable the system logs and encrypt the volume, the only way they could get the logs would be by penetrating your system.
they don't need logs, they already know you connect to this VPS with VPN protocol and that you own this VPS, they can assume all outside actions made by this VPS are made by you

>but most companies won't put a backdoor on every system, it's just unfeasible.
[citation needed]

>That's conspiracy theory. We know that Intel processors is very bugged and most probably have backdoors. But law enforcement won't use those backdoors unless you're a high priority target.
Intel Management Engine is a separate CPU inside your CPU which is not under control of your OS, it has it's own closed OS. it has access to all devices, RAM, networking. it's purpose is unknown (officially)
it is definition of backdoor

Nanonymous No.6592 [D] >>6601
>>6588
>run torrent client inside Whonix
You shouldn't torrent with Tor.
>add http trackers manually
Yeah, like you will do that for every torrent you download.
And even if you do, you shouldn't use Tor for that.
>Tor is very fast
No, it's not. It sure is fast enough for me, but you can't call 500kb/s "fast" when people have optical fiber cables now.
>they already know you connect to this VPS
For the servers you're connecting to they will only see the VPS address.
Only law enforcement and the VPS provider would have the information of who's connecting to the VPN.
I never said VPN is anonymous, btw. As I said above, use Tor for whenever possible.
>[citation needed]
As I said above, I was assuming you're using a good provider that allows you to put custom OS images (.iso). They won't modify all .iso files on-the-fly as you load it. This is not feasible. Different systems have different directory structures.
>Intel Management Engine
This is well known here, you don't need to be so pedantic.
What I said was a conspiracy theory was your idea that law enforcement would use Intel ME as a backdoor on some random guys VPN. This won't happen. They will only use it in high-profile criminals.

Nanonymous No.6601 [D] >>6607
>>6592
>You shouldn't torrent with Tor.
the discussion was if it is possible to torrent over Tor, not if you should or not. but I disagree with you, you should torrent over Tor, no reasons not to
if you say using torrents consumes a lot of Tor network bandwidth, this is not true, just don't download stupid jewish movies and dramas everyday like goyim do. files on torrent can be small or big. some files on torrent are leaks obtained by hacking, you should download such stuff over Tor. or child pornography

>Yeah, like you will do that for every torrent you download.
of course, where is the problem? it's a few clicks

>And even if you do, you shouldn't use Tor for that.
no reasons not to use Tor for that, only benefits

>No, it's not. It sure is fast enough for me, but you can't call 500kb/s "fast" when people have optical fiber cables now.
you mean 500kb/s as 500kbit/s (62.5kB/s) or 500 KBytes/s (3.9Mbit/s)? if the first, this is false. if the second, this is fast, very fast. I don't see any reasons why would 95% of people need more than that
I don't give a fuck dumb normal niggers have pointless optical fiber, as it's not needed for anything

>For the servers you're connecting to they will only see the VPS address.
>Only law enforcement and the VPS provider would have the information of who's connecting to the VPN.
that's enough. one bad action or "hate speech" and they jail you.
also, VPN are inferior in many other ways to Tor. with this stupid VPN setup, you will get same IP address for every website you visit, so the jews and cloudflare will easily track you, know that this is single person.

>I never said VPN is anonymous, btw. As I said above, use Tor for whenever possible.
whenever possible can mean always. if something doesn't support Tor, either don't use it or add proxy after Tor

>As I said above, I was assuming you're using a good provider that allows you to put custom OS images (.iso). They won't modify all .iso files on-the-fly as you load it. This is not feasible. Different systems have different directory structures.
They don't need to. they have hardware backdoors, they can read and write your RAM, they can later add backdoors to your OS (after it's installed)

>What I said was a conspiracy theory was your idea that law enforcement would use Intel ME as a backdoor on some random guys VPN. This won't happen. They will only use it in high-profile criminals.
we don't know when they use it and when they don't. also, eventually everybody can become high-profile
it is best to assume all backdoors will be used against you and not have them

Nanonymous No.6607 [D] >>6611 >>6615
>>6601
This discussion is useless, but anyway:
>you should torrent over Tor, no reasons not to
Traffic correlation. You also need to configure the torrent client well enough:
https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea

>the second, this is fast, very fast.
No, it's not. Try to download a 4GB movie at this speed. This is speed is enough for most of us anons, but not for most people that work with heavy files (such as videos and photography).
>pointless optical fiber, as it's not needed for anything
You never worked with a very big amount of data, then. Optical fiber is not used just by normies to get into facebook. It's used for connection in very big data processing servers, such as those used by CERN for scientific calculations.
>VPN are inferior in many other ways to Tor.
You need to learn text interpretation again, anon. I've said two times before I'm not recommending VPN against Tor.
Tor is clearly a much better solution for privacy.
>they can read and write your RAM, they can later add backdoors to your OS
You clearly don't understand how a VPS company works. This is not feasible to do. Of course they can do that, as they have physical access to the hardware. But most companies can't even use KVM right, let alone implant backdoors on custom strangers systems.
I would agree with you if you use the image provided by the VPS company, such as preinstalled Debian or Ubuntu. But if you install a custom .iso file, try probability of they installing a backdoor is near null.
>it is best to assume all backdoors will be used against you and not have them
That's the right mentality, but we don't have alternatives yet to Intel/AMD/ARM-SoC.

Nanonymous No.6609 [D][U][F]
File: 15b653b37ad73aa4a7bf79ca6f1a6f08dd32f0b5c59cbd372f8117e3ab4854c8.png (dl) (497.58 KiB)
>>5281
>Boxpn seems okay
Yep I'll trust a VPN who has this shit on their site. Look at Mullvad and cryptostorm for comparison.

Nanonymous No.6611 [D] >>6619
>>6607
>we don't have alternatives yet to Intel/AMD/ARM-SoC.
https://raptorcs.com/TALOSII/

Nanonymous No.6615 [D] >>6619
>>6607
>You never worked with a very big amount of data, then. Optical fiber is not used just by normies to get into facebook. It's used for connection in very big data processing servers, such as those used by CERN for scientific calculations.
Which is not the majority of Tor use case you dickfuck. Optical consumer networks are so normalfags can get slightly upgraded products so they can browse their shit tier websites with sub-second latencies. All the while calling anyone a poorfag if they insult such websites.

Nanonymous No.6619 [D] >>6620 >>6646
>>6611
Not a alternative. Most software doesn't run on POWER9 and OS support is poor. Also, this is not cheap as it's meant for servers. Most people can't afford this and it also consumes a lot of energy.
>>6615
>not the majority of Tor use case
And how do you know that? My comment was just a example. I had to download big files over Tor and it was not fun to wait almost 24 hours for it to complete.
Most people will not need fast connection, but you can't call Tor "fast". It's just not and it can't be, as the node vary the bandwidth and latency.

Nanonymous No.6620 [D] >>6621
>>6619
If it runs on GNU/Linux or BSD, why wouldn't it work on one of these?
https://wiki.raptorcs.com/wiki/Operating_System_Compatibility_List
Seems like most CLI programs should work fine, but maybe I am missing something.

Nanonymous No.6621 [D]
>>6620
Many security features are lacking on POWER. For example, some features in GRsecurity:
https://grsecurity.net/faq.php#arches
FreeBSD is only initially ported. OpenBSD doesn't even support POWER anymore.

IBM released OpenPOWER mostly because it's a dead architecture. x86_64 and ARM64 dominates the market and less operating systems are caring about POWER9 now.
>Seems like most CLI programs should work fine
For servers, probably yes. Software like Apache, mysql, etc. I don't know if Tor and TBB works in TALOS yet...

Don't get me wrong, Raptor is doing a great work. But in my opinion these capable people are using their efforts in the wrong ISA.

Nanonymous No.6646 [D]
>>6619
Tor is fast enough for webshit. The main use case of Tor is to access webshit. Otherwise we'd all be using something more like I2P.

Nanonymous No.6676 [D]
Thanks fren