this post was submitted on 13 Sep 2024
549 points (95.5% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
55085 readers
305 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
If you are worried about VPN's, why are you not worried about seedbox providers?
As he said, paid with crypto and managed with his own keys. I don't see how the seedbox provider can trace you if you do that, so there's not that much to worry about
You're going to connect to the seedbox at some point, which ties your IP to the traffic. If you are worried about a VPN attaching your IP to traffic, this is no different, no?
SFTP over TOR. This should be a requirement at this point.
If you're not doing that, then yes you're technically right in that seedbox companies can be subpoenaed too. I usually use TOR to copy over what little I torrent.
if you can't connect to a vpn using only open source software, that's a crappy vpn
What evidence do you have that no-log VPNs are compromised by the NSA? What about VPNs based in other countries like Canada?
the US has so much geopolitical reach that companies in canada or elsewhere would just hand over the question if it was high enough profile.
That's an interesting point, but I think the "if it's high profile enough" is key. People torrenting files is probably low on their priorities. On the other hand, somebody organizing a terrorist cell is probably much higher.
Companies might have an interest in finding pirates, but it would not be as easy for them to get other companies to comply with their subpoenas.
yeah if ur just a dude pirating, it probably doesn't matter, but if they find you've done a large crime, you can bet your ass that shits getting yoinked from you.
companies might, but that's almost entirely through legal processes. ceast and desists, required reporting, etc...
The existence of the NSA and their activities is not proof that they have backdoors in VPNs. That's bogeyman conspiracy theory shit—"they could be anywhere, therefore they're everywhere!"
You still haven't answered the question, and I'm beginning to think you are making shit up based on paranoia.
Is there literally any evidence that the US government managed to extract useful information from no-log vpn providers in the US?
I have (anecdotal) evidence that they, in fact, can't extract useful information from one particular no-log vpn provider in the US, PIA. They showed up to seize data, but walked away empty-handed when they found out that they are, truly, no-log and their servers run entirely from RAM, so no drives to extract data from.
You didn't answer the question. Your behavior is toxic.
Is your home machine, your phone, better protected than the VPN servers? I bet you're not as good at IT security as the IT security staff VPN companies hire
If your threat model includes nation state actors, you're best off not using networked computers
I am all about good tinfoil but some of these people acting as if they are SNOWDEN lol
Yes if feds wanted to catch you shitposting, watching big titied asian porn and downloading coldplay... I think there raised ways than compromising a VPN provider.
Unless it is a honey pot, then use a different VPN provider. Gonna need trust at the end of the day.