F5F Stay Refreshed Power Users Networks No records are generated by VPN providers.

No records are generated by VPN providers.

No records are generated by VPN providers.

Pages (2): 1 2 Next
C
chikolino1107
Junior Member
6
05-10-2023, 07:29 AM
#1
I'm exploring VPN solutions and currently run my own setup. I'm curious about how companies like ExpressVPN ensure their services remain private, even though I can manage logs on my VPS. My main concern is why they don't log data from the datacenter host, while I can disable logging on my server. I understand they likely route traffic through multiple VPNs to obscure the original IP, such as connecting via VPN 1, then VPN 2, and finally the internet. It seems like an offshore VPS might be involved. I'm not sure what data passes through each VPN except the connection flow from one to another to hide the source. Could anyone provide guidance or suggest providers with a proven no-logging record?
C
chikolino1107
05-10-2023, 07:29 AM #1

I'm exploring VPN solutions and currently run my own setup. I'm curious about how companies like ExpressVPN ensure their services remain private, even though I can manage logs on my VPS. My main concern is why they don't log data from the datacenter host, while I can disable logging on my server. I understand they likely route traffic through multiple VPNs to obscure the original IP, such as connecting via VPN 1, then VPN 2, and finally the internet. It seems like an offshore VPS might be involved. I'm not sure what data passes through each VPN except the connection flow from one to another to hide the source. Could anyone provide guidance or suggest providers with a proven no-logging record?

W
Wratzzy
Junior Member
14
05-10-2023, 02:49 PM
#2
Are you concerned about the VPS host recording what the VM does or network activity? Colocation addresses most of these concerns. You can't block everyone from logging traffic through a VPN, but with proper setup, they won't know which user initiated the request to a site. You can stop every ISP from monitoring your actions, yet if you have many connections to one destination, it becomes hard to trace the source.
W
Wratzzy
05-10-2023, 02:49 PM #2

Are you concerned about the VPS host recording what the VM does or network activity? Colocation addresses most of these concerns. You can't block everyone from logging traffic through a VPN, but with proper setup, they won't know which user initiated the request to a site. You can stop every ISP from monitoring your actions, yet if you have many connections to one destination, it becomes hard to trace the source.

X
66
05-10-2023, 06:48 PM
#3
To ensure anonymity, configure the VPN settings to mask your IP address and routing details. Use a strong encryption protocol and avoid logging any identifying information in connection logs. Regularly review and adjust your configuration to prevent traceability.
X
xXDark__LordXx
05-10-2023, 06:48 PM #3

To ensure anonymity, configure the VPN settings to mask your IP address and routing details. Use a strong encryption protocol and avoid logging any identifying information in connection logs. Regularly review and adjust your configuration to prevent traceability.

N
Nird_Bird
Member
165
05-10-2023, 10:27 PM
#4
The VPS provider would track multiple encrypted streams and web requests from your customers. To add extra security, you could increase the number of VPSs and reroute the encrypted traffic between them. The provider wouldn’t be able to identify which client initiated each request.
N
Nird_Bird
05-10-2023, 10:27 PM #4

The VPS provider would track multiple encrypted streams and web requests from your customers. To add extra security, you could increase the number of VPSs and reroute the encrypted traffic between them. The provider wouldn’t be able to identify which client initiated each request.

T
Tjeard_
Member
179
05-10-2023, 10:50 PM
#5
It sounds like you're considering how your VPN connections handle data security. While your encryption is strong (AES256-SHA256), once the request reaches the server, it may not always stay encrypted to the hosting company. Using a VPS with OpenVPN or SoftEther VPN could help ensure all traffic is protected when accessing websites.
T
Tjeard_
05-10-2023, 10:50 PM #5

It sounds like you're considering how your VPN connections handle data security. While your encryption is strong (AES256-SHA256), once the request reaches the server, it may not always stay encrypted to the hosting company. Using a VPS with OpenVPN or SoftEther VPN could help ensure all traffic is protected when accessing websites.

D
darksleyge
Junior Member
5
05-10-2023, 11:21 PM
#6
The host observes encrypted information entering the VPS while incoming web traffic leaves through it. They won’t identify the requester beyond knowing it’s from a customer. Some ISP will monitor the web request and can act freely on it.
D
darksleyge
05-10-2023, 11:21 PM #6

The host observes encrypted information entering the VPS while incoming web traffic leaves through it. They won’t identify the requester beyond knowing it’s from a customer. Some ISP will monitor the web request and can act freely on it.

J
jkrmnj
Junior Member
3
05-25-2023, 11:36 PM
#7
They would notice the encrypted information being sent to the VPS, which is connected to that request. You mentioned earlier that every data leaving would be secured, and now it appears they can observe the web traffic being transmitted.
J
jkrmnj
05-25-2023, 11:36 PM #7

They would notice the encrypted information being sent to the VPS, which is connected to that request. You mentioned earlier that every data leaving would be secured, and now it appears they can observe the web traffic being transmitted.

B
BadMemory
Member
206
05-27-2023, 10:42 AM
#8
With several participants, it’s clear which individual initiated the action. Encrypted connections between multiple VPS units make it more difficult to trace the information.
B
BadMemory
05-27-2023, 10:42 AM #8

With several participants, it’s clear which individual initiated the action. Encrypted connections between multiple VPS units make it more difficult to trace the information.

B
Bubblecat02
Junior Member
13
06-03-2023, 07:09 AM
#9
This query stands apart from previous discussions because it focuses on a specific concern about data privacy in VPN services. We revisited similar topics before, but this time we emphasized understanding network security and the limitations of log data. It’s important to consider both technical safeguards and the broader implications for user privacy.
B
Bubblecat02
06-03-2023, 07:09 AM #9

This query stands apart from previous discussions because it focuses on a specific concern about data privacy in VPN services. We revisited similar topics before, but this time we emphasized understanding network security and the limitations of log data. It’s important to consider both technical safeguards and the broader implications for user privacy.

T
TanysToy
Junior Member
48
06-10-2023, 05:47 PM
#10
This claim isn't accurate. They might attempt an "end-to-end correlation" method. Essentially, examine the incoming traffic and then align it with a pattern that matches outgoing data. The FBI and NSA have practiced similar techniques—linking incoming and outgoing flows—across several servers and jumps. Running this on one server would be straightforward.

Spoiler: The core idea is to track traffic entering the server and compare it to patterns from the server’s output. Tor has been using this approach for years, utilizing multiple nodes and routing changes. According to their documentation, they’ve refined these methods over time.

More recent developments include passive packet analysis and timing attacks in systems that mix data efficiently. For instance, Steven Murdoch’s 2007 work on PET demonstrated how to boost confidence in correlation attacks even when only a tiny fraction of packets are observed.
T
TanysToy
06-10-2023, 05:47 PM #10

This claim isn't accurate. They might attempt an "end-to-end correlation" method. Essentially, examine the incoming traffic and then align it with a pattern that matches outgoing data. The FBI and NSA have practiced similar techniques—linking incoming and outgoing flows—across several servers and jumps. Running this on one server would be straightforward.

Spoiler: The core idea is to track traffic entering the server and compare it to patterns from the server’s output. Tor has been using this approach for years, utilizing multiple nodes and routing changes. According to their documentation, they’ve refined these methods over time.

More recent developments include passive packet analysis and timing attacks in systems that mix data efficiently. For instance, Steven Murdoch’s 2007 work on PET demonstrated how to boost confidence in correlation attacks even when only a tiny fraction of packets are observed.

Pages (2): 1 2 Next