F5F Stay Refreshed Power Users Networks VPNs don't guarantee anonymity.

VPNs don't guarantee anonymity.

VPNs don't guarantee anonymity.

Pages (3): 1 2 3 Next
E
Eppikx
Senior Member
447
02-10-2016, 06:03 PM
#1
A few sections of the video are difficult to understand, yet they convey important ideas. Even when using a VPN, your ISP can still monitor your activity. It’s disappointing that genuine freedom seems unattainable now.
E
Eppikx
02-10-2016, 06:03 PM #1

A few sections of the video are difficult to understand, yet they convey important ideas. Even when using a VPN, your ISP can still monitor your activity. It’s disappointing that genuine freedom seems unattainable now.

P
pixelpiksie
Member
159
02-11-2016, 08:30 AM
#2
VPNs aren't meant to guarantee full anonymity. I'm currently testing Guardian Firewall, which hides your location and prevents apps from tracking your data. It doesn't log anything, according to my view—it's a next-gen VPN solution.
P
pixelpiksie
02-11-2016, 08:30 AM #2

VPNs aren't meant to guarantee full anonymity. I'm currently testing Guardian Firewall, which hides your location and prevents apps from tracking your data. It doesn't log anything, according to my view—it's a next-gen VPN solution.

N
normanmartus
Member
61
02-11-2016, 02:29 PM
#3
It's well known that VPNs are considered one of the biggest scams of this decade.
N
normanmartus
02-11-2016, 02:29 PM #3

It's well known that VPNs are considered one of the biggest scams of this decade.

S
sydaves5418
Member
66
02-14-2016, 01:45 AM
#4
That’s really impressive work. I’m looking forward to seeing it become more common. Do you believe businesses will continue trying to collect your data?
S
sydaves5418
02-14-2016, 01:45 AM #4

That’s really impressive work. I’m looking forward to seeing it become more common. Do you believe businesses will continue trying to collect your data?

B
Beavz
Member
208
02-14-2016, 09:21 PM
#5
First identify your objective. If anonymity is essential, visit a library with a computer. To stay truly unseen by trackers, logs, and tech, you must act as someone else—limit what you do and change your identity. This level of secrecy is crucial if you reside in China and wish to oppose authorities. For everyday needs like browsing at McDonald’s, encrypting your traffic with a VPN is sufficient. If you need partial privacy from home, choose a reputable provider that has been audited or operates in a country outside the 14 Eyes agreement. Alternatively, consider using a roaming dongle that routes your traffic through a server at a hotel, café, or business.

When working on a shared computer like one in a library, opt for a clean, untouched desktop—no personal files, no social media logins, and minimal software. Use only a basic browser with no history. Connect this device to a gateway (often your firewall) that links to your preferred VPN. Then route all internet activity through the VPN. A more secure setup involves joining a busy VPN node network, making it harder for anyone to trace your activity.

If surveillance is a concern, a Tor network becomes necessary, though it offers less privacy than a well-chosen VPN. The main advantage of a VPN lies in its ability to mask your destination server, protecting your data even if your ISP knows you’re using it. However, this protection only matters if authorities are monitoring your actions—otherwise, your service provider may not invest significant resources in tracking you.
B
Beavz
02-14-2016, 09:21 PM #5

First identify your objective. If anonymity is essential, visit a library with a computer. To stay truly unseen by trackers, logs, and tech, you must act as someone else—limit what you do and change your identity. This level of secrecy is crucial if you reside in China and wish to oppose authorities. For everyday needs like browsing at McDonald’s, encrypting your traffic with a VPN is sufficient. If you need partial privacy from home, choose a reputable provider that has been audited or operates in a country outside the 14 Eyes agreement. Alternatively, consider using a roaming dongle that routes your traffic through a server at a hotel, café, or business.

When working on a shared computer like one in a library, opt for a clean, untouched desktop—no personal files, no social media logins, and minimal software. Use only a basic browser with no history. Connect this device to a gateway (often your firewall) that links to your preferred VPN. Then route all internet activity through the VPN. A more secure setup involves joining a busy VPN node network, making it harder for anyone to trace your activity.

If surveillance is a concern, a Tor network becomes necessary, though it offers less privacy than a well-chosen VPN. The main advantage of a VPN lies in its ability to mask your destination server, protecting your data even if your ISP knows you’re using it. However, this protection only matters if authorities are monitoring your actions—otherwise, your service provider may not invest significant resources in tracking you.

M
MondrySteve
Junior Member
1
02-20-2016, 07:48 PM
#6
They're not meant that way. It's possible you're missing the point. They weren't designed to stop tracking.
M
MondrySteve
02-20-2016, 07:48 PM #6

They're not meant that way. It's possible you're missing the point. They weren't designed to stop tracking.

R
RedxAce
Junior Member
5
02-20-2016, 09:19 PM
#7
Precisely... Perhaps it's because I genuinely grasp how much of the marketing is just fear-based manipulation.
R
RedxAce
02-20-2016, 09:19 PM #7

Precisely... Perhaps it's because I genuinely grasp how much of the marketing is just fear-based manipulation.

O
O_L_A_Y
Member
74
02-27-2016, 12:03 AM
#8
VPNs direct all your data solely via your VPN server. To remain anonymous, you’d need to rely on Tor instead.
O
O_L_A_Y
02-27-2016, 12:03 AM #8

VPNs direct all your data solely via your VPN server. To remain anonymous, you’d need to rely on Tor instead.

D
Dominar_
Member
52
03-11-2016, 09:29 AM
#9
Your internet service provider monitors your data usage and destinations. A VPN masks this information from them. VPNs serve various purposes. ISPs can slow down traffic; some providers intentionally restrict services like Netflix or Hulu. The push for net neutrality in the US originated after Comcast was found throttling BitTorrent, prompting the FCC to intervene. Comcast challenged the decision in court, but the courts ruled the FCC lacked authority, allowing it to classify ISPs as Title 2 entities. VPNs enable secure communication between devices across the web. Many organizations deploy them for remote employees to safely connect to their networks. To clarify, companies typically handle VPN setup on company-issued devices, ensuring secure access. Pirates often use VPN services to conceal their activities. While ISPs track usage and routes, they usually can’t inspect transmitted data. The main aim of VPNs isn’t to prevent online tracking, but to protect your information from malicious actors such as hackers, government agencies, or intelligence services.
D
Dominar_
03-11-2016, 09:29 AM #9

Your internet service provider monitors your data usage and destinations. A VPN masks this information from them. VPNs serve various purposes. ISPs can slow down traffic; some providers intentionally restrict services like Netflix or Hulu. The push for net neutrality in the US originated after Comcast was found throttling BitTorrent, prompting the FCC to intervene. Comcast challenged the decision in court, but the courts ruled the FCC lacked authority, allowing it to classify ISPs as Title 2 entities. VPNs enable secure communication between devices across the web. Many organizations deploy them for remote employees to safely connect to their networks. To clarify, companies typically handle VPN setup on company-issued devices, ensuring secure access. Pirates often use VPN services to conceal their activities. While ISPs track usage and routes, they usually can’t inspect transmitted data. The main aim of VPNs isn’t to prevent online tracking, but to protect your information from malicious actors such as hackers, government agencies, or intelligence services.

K
Koyoth
Junior Member
12
03-11-2016, 10:59 AM
#10
The ISP can’t just limit VPN traffic because data may still be monitored between the gateway and your destination, while you’re only protecting your route to the gateway. Most VPNs don’t encrypt UDP traffic by default, which means hackers can intercept it. Your organization is leveraging this to grant access to internal systems without exposing them online, and also to enable safe use of public Wi-Fi networks where a VPN offers real value.
K
Koyoth
03-11-2016, 10:59 AM #10

The ISP can’t just limit VPN traffic because data may still be monitored between the gateway and your destination, while you’re only protecting your route to the gateway. Most VPNs don’t encrypt UDP traffic by default, which means hackers can intercept it. Your organization is leveraging this to grant access to internal systems without exposing them online, and also to enable safe use of public Wi-Fi networks where a VPN offers real value.

Pages (3): 1 2 3 Next