Using a VPN generally increases your latency. Latency is…bad. They are advertising a negative consequence as a positive feature, banking on the target market not having enough understanding of the terms in play.
Explaining a joke is like dissecting a frog. You might understand it better but the frog is dead.
They have some additional services they advertise that supposedly deals with these, though I’d imagine they require installed software which would give them more visibility into systems than I’m comfortable with.
For trackers and to some extent malware, they could potentially block some by disallowing outgoing traffic from the VPN to known tracker IP’s/domains or C&C hosts/networks, but I could see that being fairly infectivity overall with potentially for false positives.
VPNs are great for avoiding the nastygrams that your ISP forwards to you from media companies. They get sent to some company that doesn’t care about US laws instead, and probably laughed at before being deleted
Well, not really with these, per se. My own VPN, Wireguard, routes back through my pihole service to double down on it’s filtering. For the most, I’m not trying to obfuscate my ip. If I wanted to do that I’d use tor or something. I just don’t want my traffic to be easily snooped on when I’m connected to wifi that isn’t mine.
With a VPN it’s harder for some and impossible for others. But don’t for a second think nobody can see what you’re doing. I don’t want to go into the whole tinfoil provacy rabbithole but with things like browser fingerprinting it’s all moot
Everything’s visible for HTTP, and in fact some ISPs inject their own ads into HTTP content. HTTPS is harder for malicious actors, but your ISP can tell when you’re visiting pornhub.com, and will happily provide that to the government. With encrypted SNI it’s somewhat harder, but if you’re visiting an IP address of 1.2.3.4, and that IP address is solely used by pornhub.com, it’s not hard to guess what you’re up to.
Yes, I’m aware. IP addresses are come colocated to hell and back, and every site uses https. I’m sure your ISP is getting some real interesting data watching you visit the same 4 sites.
Mine have their own free vpn service which encrypts all traffic and hides your IP. So even if the government want anything on you they can’t give it to them.
On top of that they are notorious for not giving the government anything. They also have competitive pricing.
Instead of tapping individual connections, you now only have to tap the traffic to/from the VPNs exit nodes. Then you correlate incoming packets with outgoing packets (e.g. based on size, timing, etc) and you know the origin of the traffic.
Bonus is that it acts as a filter, people using a VPN want to hide their traffic so you specifically want to watch those people.
If a VPN is big enough, you can’t really do that sort of correlation due to the level of traffic involved. I guess that would work for visitors to woman-inflates-a-balloon-and-sits-on-it-and-pops-…, but wouldn’t work at all for google.com
They literally aren’t saying anything. There are no verbs in this advertisement; the narrator is speaking in noun phrases, not sentences. So he’s literally saying nothing.
Add comment