Since YouTube influencer marketing you know you need a VPN
(i.e. virtual private network). There many of services, mostly
commercial, but also some free and academic options.
While VPNs are a solid solution in an institutional environment to
access one’s company’s network, or for circumventing censorship or
geo-blocking, there’re wild claims being made when it comes to potential
capabilities of VPNs or internet threats in general.
This article is not intended to deeply elaborate on that, but serves as
a personal memo as well as a thought piece.
Since YouTube influencer marketing you know you need a VPN (i.e. virtual private network). There are lots of services, mostly commercial after all, but also some free and academic options.
While VPNs are definitely a solution in an institutional/ company setting to access one’s company’s intranet remotely, or for safely circumventing national censorship and geo-blocking by streaming or national broadcasting services, there’re wild claims being made when it comes to potential capabilities of VPNs or use cases.
This article is not intended to deeply elaborate on that, but serves as a personal memo as well as a small thought piece in the sanity check below.
For more knowledgeable information on VPNs, see the EFF’s article on Choosing the VPN That’s Right for You↗.
VPN Gate
Academic Experiment Project↗ is an online service as an academic
research at Graduate School of University of Tsukuba, Japan. The purpose
of this research is to expand the knowledge of “Global Distributed
Public VPN Relay Servers”.
The project is not only for consumption, but anyone is encouraged to participate↗.
Do we trust it? No. Do we use it? For our purposes, yes.
list of 7000+ public VPN relay servers by volunteers around the world:
U/N: vpn
P/W: vpn
SoftEther VPN↗ is an Open-Source, free, cross-platform multi-protocol VPN program, developed as an academic project from University of Tsukuba↗, under the Apache License 2.0.
Download, install and set-up:
VPN advertisements are common on social media these days and making
the wildest claims about privacy, security and anonymity. Basically just
with the click of a button, you’re safe and virtually invisible on the
internet, surfing “through an unbreakable tunnel that no one can look
into, be it cybercriminals, governments, or internet service
providers”!?
Naturally, this is not true, as technically one is basically only
changing IPs1 and very importantly WHO is
tracking your internet usage now. Switching (trust) from a local
Internet Service provider (ISP) to another third party service with
usually unclear jurisdictions.
Of course, all VPN providers will claim that according to their
policy they’d encrypt your data, never keep any history logs, DNS
requests or other personal information and whatnot, but one should treat
that as nothing more than marketing, especially when the service has any
ties to any of the Five/ Fourteen Eyes alliance (FVEY↗) members and
ask: who hasn’t!?
This question is relevant, because (remember Upstream and
PRISM↗!?) companies operating from any of the alliance states can be
forced to spy on users without having any legal way to disclose that
fact to their users, possibly bound with a gag order that cannot be
violated without risking severe legal consequences
(i.e. Prism). In upstream surveillance, the agencies’
partners like AT&T tap into the wires directly and copy all of the
data flowing through the data highway. Of course, the companies will
comply, while marketing-wise they’ll phrase it such they didn’t.
Moreover, even if a service operates from a safe haven, what about their
(physical) infrastructure: does the VPN provider actually OWN those
machines? Or are they rather outsourced and rented from a 3rd party
located in a 3rd (or even 4th) party network, or running services on
virtual machines hosted by third parties? Does anyone believe that VPN
providers can easily offer exit machines in two dozen countries by
deploying hardware they own and operate in datacentres they can
trust?
In an ideal setting, your VPN provider owns all of the hardware AND the
network it operates, yet, after all, most VPN providers are primarily
businesses! And the primary objective of most businesses is revenue and
driving costs down…
As a result, one of the easiest ways to infiltrate and exploit VPN
infrastructure is simply to offer cheap (possibly even tax-payer
subsidised) server hosting, “tailored for your company’s needs”.
And even worse, some “VPN” services are simply outright scams↗.
Besides unscrupulous organizations that make online privacy harder for the general population, like the various government agencies wiretapping and breaking into systems to steal our data, or ISP/ VPN services that mess with user traffic and inject ads to earn some extra revenue by exploiting their customers for advertising, the technology itself is not inherently safe easy to deal with either, e.g. due to
Again, for more knowledgeable information see the EFF’s guide on Choosing the VPN That’s Right for You↗.
While primarily intended as advertisements for their VPN service “IPredator”,
co-founded by Pirate Bay co-founder Peter Sunde, the comics actually
raised some valid points to consider, that obviously largely served as
the inspiration for the above.
As neither their site nor their services are available any longer, this
“comic” (or “textbook”!?) can now be found below again for educational
purposes:
Using a VPN masks the IP address assigned by your ISP from the sites that you access, adding a layer of privacy. Along with masking your origin IP address, it also encrypts your data while in transit to the site you are accessing, which actually is useful especially when connected to an insecure Wi-Fi network in a café, airport, library, or somewhere else.↩︎
For attribution, please cite this work as
Schmalfuss (2021, Dec. 18). OS DataMercs: A rough guide to VPNs. Retrieved from https://www.datamercs.net/posts/2021-12-18-a-rough-guide-to-vpns/
BibTeX citation
@misc{schmalfuss2021a, author = {Schmalfuss, Olaf}, title = {OS DataMercs: A rough guide to VPNs}, url = {https://www.datamercs.net/posts/2021-12-18-a-rough-guide-to-vpns/}, year = {2021} }