Howdy,
Fiber internet is right around the corner. Some neighbors are already connected and they working their way to my area. Once I get connected,
I also want to use a VPN but only for some programs. Example, I want Ktorrent and a couple Firefox profiles to use VPNs but at least one
Firefox profile I want to remain outside of VPN. I watched a few videos
but want to be sure I understand this right. If I want software to use
a VPN, I put the IP address of the VPN into the proxy settings of the
program and that makes it use the VPN. If I want it to not use the VPN,
I leave the settings as they are now. Am I understanding this correctly?
Also, the package I'm getting is 500Mbs/sec. What speeds should I
really expect? If memory serves me right, that is about 50MBs/sec, note
the size of the B. By the way, that is about 50 times faster than what
I have now. Also, up and down is the same. Current up stream is a lot smaller. Basically, I can upload files as fast as I download them. Now
I can upload videos or something.
I'm looking at Surfshark and NordVPN. Both seem to be good and at a
decent price. Anyone used one or both of these?
Just trying to make sure I'm on the right path.
Thanks.
Dale
:-) :-)
P. S. Seamonkey is still not fetching emails automatically, I'm waiting
on a upgrade to see if it gets fixed then. If not, revive old thread
and bring out the hammer. ;-)
Basically, I can upload files as fast as I download them. Now I can upload videos or something.
Also, the package I'm getting is 500Mbs/sec. What speeds should I
really expect? If memory serves me right, that is about 50MBs/sec, note
the size of the B. By the way, that is about 50 times faster than what
I have now. Also, up and down is the same. Current up stream is a lot smaller. Basically, I can upload files as fast as I download them. Now
I can upload videos or something.
> smaller. Basically, I can upload files as fast as I download them. Now<br>> I can upload videos or something. <br><div><br></div><div>You will almost certainly get your 500Mb pretty much right away - or </div><div>within a day or two. Iget 475Mb on my comcast cable connection</div><div>but it's rate limited at the other end. They sell and upgrade which</div><div>I don't need. At these speeds it's more about bytes/month than </div><div>bytes/second so make sure you know how
<div>- Mark</div></div>
On Saturday, 16 July 2022 11:57:25 BST Dale wrote:
Basically, I can upload files as fast as I download them. Now I can upload >> videos or something....or run a web server!
Mark Knecht wrote:
On Sat, Jul 16, 2022 at 3:57 AM Dale <rdalek1967@gmail.com <mailto:rdalek1967@gmail.com>> wrote:
<SNIP>
Also, the package I'm getting is 500Mbs/sec. What speeds should I
really expect? If memory serves me right, that is about 50MBs/sec, note the size of the B. By the way, that is about 50 times faster than what
I have now. Also, up and down is the same. Current up stream is a lot smaller. Basically, I can upload files as fast as I download them. Now I can upload videos or something.
You will almost certainly get your 500Mb pretty much right away - or
within a day or two. I get 475Mb on my comcast cable connection
but it's rate limited at the other end. They sell and upgrade which
I don't need. At these speeds it's more about bytes/month than
bytes/second so make sure you know how much data you can move
without incurring any extra charges.
As for upload I'm limited at about 13Mb/S. I can upload lots of
data to a Google drive for backups but I have to do it slowly
- Mark
If I understand this correctly, they are stating bits but most data
speeds are commonly in bytes. I read once where one should divide by 8
or 9 to get the true speed in common use. Internet folks use the larger number because it makes it look bigger. If I'm correct, and allowing a little for overhead, I'll see about 50MBs/sec in common use terms. In
other words, using none salesman terms.
From what they state, there is no limits. I may be a bit of a heavy
user at first but at some point, hard drive space will slow me down.
I'm a collector of videos and other documents. If I download it, I tend
to keep it unless it is really of no use. I've got videos on appliance repairs, tractor, tree management and just interesting stuff that I
refer back to. It's a lot. Organizing it is also fun.
I'm hoping to get it pretty soon. It's getting really close to me.
Dale
:-) :-)
If I understand this correctly, they are stating bits but most dataspeeds are commonly in bytes. I read once where one should divide by 8 or
From what they state, there is no limits. I may be a bit of a heavy userat first but at some point, hard drive space will slow me down. I'm a collector of videos and other documents. If I download it, I tend to keep
I'm hoping to get it pretty soon. It's getting really close to me.
Dale
On Sat, Jul 16, 2022 at 3:57 AM Dale <rdalek1967@gmail.com <mailto:rdalek1967@gmail.com>> wrote:
<SNIP>
Also, the package I'm getting is 500Mbs/sec. What speeds should I
really expect? If memory serves me right, that is about 50MBs/sec, note the size of the B. By the way, that is about 50 times faster than what
I have now. Also, up and down is the same. Current up stream is a lot smaller. Basically, I can upload files as fast as I download them. Now I can upload videos or something.
You will almost certainly get your 500Mb pretty much right away - or
within a day or two. I get 475Mb on my comcast cable connection
but it's rate limited at the other end. They sell and upgrade which
I don't need. At these speeds it's more about bytes/month than
bytes/second so make sure you know how much data you can move
without incurring any extra charges.
As for upload I'm limited at about 13Mb/S. I can upload lots of
data to a Google drive for backups but I have to do it slowly
- Mark
And you'll need to always keep in mind that a VPN is a low-level
protection. It's enough for protecting yourself against spammers, script kiddies or
similar but it can't keep you private in the face of any high-level
threats. Don't place too much trust in VPNs.
Peter Humphrey wrote:
On Saturday, 16 July 2022 11:57:25 BST Dale wrote:
Basically, I can upload files as fast as I download them. Now I can upload...or run a web server!
videos or something.
That's way above anything I'd want to tackle. Heck, this VPN thing is a
bit confusing. I've never seen it used before so sort of lost with it.
Maybe once installed it will make sense.
Howdy,
Fiber internet is right around the corner. Some neighbors are already connected and they working their way to my area. Once I get connected,
I also want to use a VPN but only for some programs. Example, I want Ktorrent and a couple Firefox profiles to use VPNs but at least one
Firefox profile I want to remain outside of VPN. I watched a few videos
but want to be sure I understand this right. If I want software to use
a VPN, I put the IP address of the VPN into the proxy settings of the
program and that makes it use the VPN. If I want it to not use the VPN,
I leave the settings as they are now. Am I understanding this correctly?
Also, the package I'm getting is 500Mbs/sec. What speeds should I
really expect? If memory serves me right, that is about 50MBs/sec, note
the size of the B. By the way, that is about 50 times faster than what
I have now. Also, up and down is the same. Current up stream is a lot smaller. Basically, I can upload files as fast as I download them. Now
I can upload videos or something.
I'm looking at Surfshark and NordVPN. Both seem to be good and at a
decent price. Anyone used one or both of these?
Just trying to make sure I'm on the right path.
Thanks.
Dale
:-) :-)
P. S. Seamonkey is still not fetching emails automatically, I'm waiting
on a upgrade to see if it gets fixed then. If not, revive old thread
and bring out the hammer. ;-)
I also ordered a router that has openvpn installed on it. I watched
some videos and think I can set it up to keep my traffic out of public
view. After I learned more about it, there's no reason to not use the
VPN for all traffic really. That way I'm protected a little bit even if
a website is not secure.
On Thursday, 4 August 2022 23:32:03 BST Dale wrote:
I also ordered a router that has openvpn installed on it. I watchedIf by "not secure website" you mean an unencrypted connection to a web server,
some videos and think I can set it up to keep my traffic out of public
view. After I learned more about it, there's no reason to not use the
VPN for all traffic really. That way I'm protected a little bit even if
a website is not secure.
then such an insecure website remains insecure and so does your connection to it, whether the leg from your router to the VPN concentrator is encrypted or not.
What kind of protection are you seeking - what is your threat model?
Michael wrote:
What kind of protection are you seeking - what is your threat model?
I'm mostly wanting it so people can't just look and see what I'm doing
or where I am, mostly my ISP.
I do a little torrenting and such too.
;-) That said, even if I go to my bank's website which is https, it
will also go through a VPN which also encrypts the traffic. My bank is secure as far as I know but having more protection added can't be a bad thing.
I'm torn between torguard and surfshark. I'm not sure where torguard is located but surfshark is in the Netherlands I think. Outside US
jurisdiction and from what I've read, they never give info to anyone
about their customers traffic.
I'm still researching torguard. Maybe
someone here knows where they are located???
Oh, and note that if your ISP works the same way as mine, they have a backdoor into whatever equipment they happen to have provided. So definitely put it in bridge mode or whatever and use your own gear if you don't want them spying on the doings ofyour internal network. One of the local ISPs here even calls it a "feature" and will ping the mobile app they require you to install to use their service every time they detect "suspicious" traffic on your internal net...
Peter Humphrey wrote:
On Saturday, 16 July 2022 11:57:25 BST Dale wrote:
Basically, I can upload files as fast as I download them. Now I can upload >>> videos or something....or run a web server!
That's way above anything I'd want to tackle. Heck, this VPN thing is a
bit confusing. I've never seen it used before so sort of lost with it. Maybe once installed it will make sense.
Dale
:-) :-)
On 05/08/2022 15:53, Laurence Perkins wrote:
Oh, and note that if your ISP works the same way as mine, they have a backdoor into whatever equipment they happen to have provided. So definitely put it in bridge mode or whatever and use your own gear if you don't want them spying on the doings of your internal network. One ofWhat do they do if you don't know how to use a mobile? (Yes that IS a
the local ISPs here even calls it a "feature" and will ping the mobile
app they require you to install to use their service every time they
detect "suspicious" traffic on your internal net...
serious question - I provide tech support to family like that :-)
On Friday, 5 August 2022 21:45:25 BST Dale wrote:
Michael wrote:In this case 'people' and your ISP will see you are connecting to the remote VPN, but not what website you visit thereon.
What kind of protection are you seeking - what is your threat model?I'm mostly wanting it so people can't just look and see what I'm doing
or where I am, mostly my ISP.
The website you visit will not see your real IP, but the exit IP of the VPN node. This may break some websites and streaming services who only allow connections from specific jurisdictions.
I do a little torrenting and such too.All connections to banks are encrypted end-to-end for decades now and the encryption has becoming stronger over the years.
;-) That said, even if I go to my bank's website which is https, it
will also go through a VPN which also encrypts the traffic. My bank is
secure as far as I know but having more protection added can't be a bad
thing.
I'm torn between torguard and surfshark. I'm not sure where torguard isYeah, that's what they all say - their business model depends on it. State sponsored actors are likely to know what the need to know anyway, with or without the explicit VPN providers collaboration. ;-)
located but surfshark is in the Netherlands I think. Outside US
jurisdiction and from what I've read, they never give info to anyone
about their customers traffic.
I'm still researching torguard. MaybeI understand they are a US based provider in Florida:
someone here knows where they are located???
Vpnetworks, LLC
618 E South St
Orlando, FL 32801
but they have VPN servers all over the globe. Some are virtual servers and are NOT physically located in the countries they claim. The fact it is located in the USA it means the authorities can request client list information. VPN providers in jurisdictions like BVI, Panama, or even Switzerland might stand a better chance.
Anyway, this is a moot point. If a VPN provider protects your traffic from 'people', who protects your traffic from the ... VPN people?! LOL!
I don't use VPNs, but the interwebs are buzzing with reviews and suggestions. If torrenting is a requirement, then associated forums and mailing lists would
provide advice on what works best for your use case.
Michael wrote:
All connections to banks are encrypted end-to-end for decades now and the encryption has becoming stronger over the years.
That is likely true. I still remember Snowden tho. We don't know what backdoors are in use even for bank encryption.
Thing is, open source
tools are harder to fall into that trap since everyone can see what the
code is. If a backdoor is forced in, it will be known to a lot of
people and then that tool won't be used. It's sort of funny in a way,
they more Govts and others try to restrict things, the more tools there
is to get around it. From what I've read, most VPNs use open source
tools. Most even use the current best and would upgrade if needed.
That gives me some extra protection in the event my bank or any other
website falls behind on updating theirs.
Basically, I don't trust Govt with much of anything. If they say they
don't do something bad, you can pretty much bet they are doing exactly
that or even worse.
Well, that settles that then. I guess it will be Surfshark. Pretty
sure it is in the Netherlands but may be wrong on country. I just
recall it being outside US jurisdiction. I also read they have been
audited by independent people to ensure they have no logs even if asked.
Michael wrote:
On Saturday, 6 August 2022 07:07:26 BST Dale wrote:
Well, that settles that then. I guess it will be Surfshark. PrettySurfshark gets good reviews and it offers the wireguard protocol with the
sure it is in the Netherlands but may be wrong on country. I just
recall it being outside US jurisdiction. I also read they have been
audited by independent people to ensure they have no logs even if asked.
ChaCha20 cipher for better encryption and performance. However, the
Netherlands is part of the EU and 14 eyes, so I would think similar state
powers exist to access your private communications and the ISPs would have no
way of refusing and staying in business. Surfshark offers a warrant canary, >> but it looks more like a marketing statement to me when you compare it to
something like the Qubes digitally signed canaries.
I forgot about the 14 eyes thing. Do you know of one outside that that
is good? The bad thing about most, they are pricey if done by the month
for testing. You only get a good deal if you subscribe for a year or
even two years. I don't want to subscribe and then find out it is a bad one.
Dale
:-) :-)
On Saturday, 6 August 2022 07:07:26 BST Dale wrote:
Well, that settles that then. I guess it will be Surfshark. PrettySurfshark gets good reviews and it offers the wireguard protocol with the ChaCha20 cipher for better encryption and performance. However, the Netherlands is part of the EU and 14 eyes, so I would think similar state powers exist to access your private communications and the ISPs would have no way of refusing and staying in business. Surfshark offers a warrant canary, but it looks more like a marketing statement to me when you compare it to something like the Qubes digitally signed canaries.
sure it is in the Netherlands but may be wrong on country. I just
recall it being outside US jurisdiction. I also read they have been
audited by independent people to ensure they have no logs even if asked.
I also want to use a VPN but only for some programs. Example, I want Ktorrent and a couple Firefox profiles to use VPNs but at least one
Firefox profile I want to remain outside of VPN.
Dale wrote:
Michael wrote:
On Saturday, 6 August 2022 07:07:26 BST Dale wrote:
Well, that settles that then. I guess it will be Surfshark. PrettySurfshark gets good reviews and it offers the wireguard protocol with the >> ChaCha20 cipher for better encryption and performance. However, the
sure it is in the Netherlands but may be wrong on country. I just
recall it being outside US jurisdiction. I also read they have been
audited by independent people to ensure they have no logs even if asked. >>
Netherlands is part of the EU and 14 eyes, so I would think similar state >> powers exist to access your private communications and the ISPs would
have no way of refusing and staying in business. Surfshark offers a
warrant canary, but it looks more like a marketing statement to me when
you compare it to something like the Qubes digitally signed canaries.
I forgot about the 14 eyes thing. Do you know of one outside that that
is good? The bad thing about most, they are pricey if done by the month for testing. You only get a good deal if you subscribe for a year or
even two years. I don't want to subscribe and then find out it is a bad one.
Dale
:-) :-)
I did a quick google search and Surfshark is based in British Virgin
Islands and is outside the eyes countries. I was thinking it was
Netherlands but wasn't sure.
When I searched for VPN outside 14 eyes
country, Surfshark is highly rated. Depending on the site, it's in the
top few each time.
https://earthweb.com/vpn-outside-14-eyes/
https://www.privateproxyguide.com/best-vpn-outside-14-eyes/
Unless there is some good reason to avoid, still thinking of using it.
I did a quick google search and Surfshark is based in British Virgin
Islands and is outside the eyes countries.
On Saturday, 6 August 2022 12:08:30 BST Dale wrote:
...
The more you try to escape the 14 eyes Big Brother, the closer you may fall into the hands of various authoritarian regimes. LOL! Even VPNs like NordVPN
which operates within the jurisdiction of Panama (let's not forget it is Langley's doorstep), it also has offices in the UK, Netherlands and Lithuania.
I wonder why . . .
Total privacy on the Internet is improbable. If your only concern is to retain your privacy from your ISP with regards to your Internet connections, then most/any VPN service will offer this benefit by obfuscating your IP address. Your browsing patterns, browser User Agent, addons and umpteen other
OS and application fingerprints won't be obfuscated beyond the VPN server. Therefore your identity can only be protected so much and no more.
On 6/8/22 20:42, Michael wrote:
On Saturday, 6 August 2022 12:08:30 BST Dale wrote:
...
The more you try to escape the 14 eyes Big Brother, the closer you may
fall
into the hands of various authoritarian regimes. LOL! Even VPNs like NordVPN which operates within the jurisdiction of Panama (let's not
forget it is Langley's doorstep), it also has offices in the UK, Netherlands and Lithuania. I wonder why . . .
Total privacy on the Internet is improbable. If your only concern is to retain your privacy from your ISP with regards to your Internet connections, then most/any VPN service will offer this benefit by obfuscating your IP address. Your browsing patterns, browser User Agent, addons and umpteen other OS and application fingerprints won't be obfuscated beyond the VPN server. Therefore your identity can only be protected so much and no more.Also, leakage is almost inevitable ... DNS, content distribution
networks, browser fingerprinting, timezones, paying online with a US
credit card, US delivery address and just simple mis-configuration
exposing you to risk etc. My impression as a long time openvpn user is
that TOR and the TOR browser might be the closest to secure for your purposes? Also, keep in mind that things like online shopping will cost
you more overseas because if you are successful in hiding you are in the
US you will get the international surcharges, or in some cases ordering
IT stuff from the US you have to fill out export clearances (once even
for sparkfun hobby stuff!) :) ... then if you pay with a US card and/or
have a US delivery address they have got you anyway - in fact being in
Oz I gave it up as being no gain, too much pain to use a VPN try and get cheaper US shopping. I found myself having to maintain two totally independent systems with one in a locked down VPN with US settings with
all traffic actively blocked from the local network, and use US shipping
and packaging firms that offered facilities to buy on my behalf. That
is much harder than you think - trusting the end points is only one
small part of the problem you are trying to solve and from the Gov
monitoring point of view almost certainly a waste of time anyway as they
have massive resources. The best you can hope for with openvpn is SSL
point to point level security. Just use HTTPS, a good browser and be
part of the crowd - if you are trawling suspect/socially compromising websites you do not want anyone to see you going to, no matter what you
do there will always be a risk and as a VPN user you are a more likely
target for a closer look anyway. I am sure the bigger online VPN
providers would be monitored closely - at least TOR is likely to help
more than a plain VPN.
BillK
The best a well configured VPN tunnel can offer is a secure connection between
client and VPN server, which is handy if you are out and about using untrusted
and insecure WiFi hotspots.
The only other reason for using a VPN service is to present a different geolocation for the purpose of overcoming country-specific website restrictions.
On Sun, Aug 7, 2022 at 11:36 AM Michael <confabulate@kintzios.com> wrote:
The best a well configured VPN tunnel can offer is a secure connection between client and VPN server, which is handy if you are out and about using untrusted and insecure WiFi hotspots.
The only other reason for using a VPN service is to present a different geolocation for the purpose of overcoming country-specific website restrictions.
I think ONLY is a bit strong here. A VPN effectively makes it
impossible for your ISP to know who you're talking to, and it obscures
your IP from hosts you are connecting to.
Sure, there are ways to defeat this, but most of them are only
applicable for state-level actors, and the methods available to
ordinary companies can only identify at best a unique browser profile,
which only lets them correlate traffic with those they share info with
to the degree that you use a single browser profile across those
platforms. For non-web traffic there are generally fewer attacks
available. Many of the attacks that are often cited like DNS-based
attacks are not that difficult to prevent (eg by ensuring your DNS
traffic goes out over the VPN).
If there are sites you browse using a different browser profile
(ideally on a VM/etc), and you never use that browser profile for
ecommerce or activity associated with your normal social media
accounts, then it is unlikely that those sites will actually be able
to identify you.
Really the biggest pain with the VPNs is the number of websites that
actively try to block connections from them or flood you with
CAPTCHAs. Many more mainstream social media sites/etc also
effectively require association with a mobile phone number, or trigger
this behavior if they don't like your IP address. Obviously VPNs can
be abused to attack hosts or evade bans and generally cause trouble,
which is a frustration for those who simply don't want companies to
know who you are.
Bottom line is that just because the NSA can track your connections
doesn't mean that every random webserver on the planet can do so. The
few government agencies that are likely to be that well-connected are
also very interested in keeping the extent of their capabilities
hidden from each other, and so when they intercept your data they're
going to guard it even more carefully than you would.
A solution doesn't need to be able to defeat the NSA to be useful.
I would strongly recommend getting your own equipment with most ISPs since the rental price on their equipment will buy a new modem yearly.
Now, that said, the other ISP in the area also has a backdoor, and they try to connect to it any time they're running diagnostics, and if the
connection fails then they reset the circuit. So your choice is use one of their sanctioned models and leave the backdoor alone or else have sporadic dropouts.
So government level actors spying on your banking just go to the
bank. And they've been getting more nosey in recent years. Last I
heard, any transaction over $600 gets automatically reported to them,
and they keep talking about lowering that threshold.
Thank goodness I don't live in the good ol' US of A. The land of the
free? Hm...
On Tue, 09 Aug 2022 00:04:53 +0100, Peter Humphrey wrote:
So government level actors spying on your banking just go to the
bank. And they've been getting more nosey in recent years. Last I heard, any transaction over $600 gets automatically reported to them,
and they keep talking about lowering that threshold.
Thank goodness I don't live in the good ol' US of A. The land of the
free? Hm...
We still have the protections introduced by the EU. Let's hope the
government aren't about to tear them up... oh, they are.
I've heard a few, similar stories from your side of the pond. So far as I can tell it's a matter of incompetence, not maliciousness.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 302 |
Nodes: | 16 (2 / 14) |
Uptime: | 100:05:10 |
Calls: | 6,767 |
Calls today: | 5 |
Files: | 12,295 |
Messages: | 5,376,419 |
Posted today: | 1 |