- Joined
- Oct 28, 2017
I chose IVPN in the end because they're based in Gibraltar.
Gibraltar is an overseas territory of the U.K., which is a Five Eyes country.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
I chose IVPN in the end because they're based in Gibraltar.
Gibraltar is an overseas territory of the U.K., which is a Five Eyes country.
But from what I understand, they keep their own autonomy even if it's a UK territory.
ExpressVPN is based in the British Virgin Islands, also a UK territory, and maintains it's own set of regulations on data.
They offer .ovpn files. Even for the free service. At least they did the last time I cared.Does Proton VPN allow me to download a simple .ovpn file or do I have to use their app?
Oh I see, this answers my question. Dodged a bullet on this one, too bad." TunnelBear does not collect traffic logs or monitor any user activity. It does collect some data, including your OS, whether or not you’ve been active this month, and the total amount data used within a month. However, “TunnelBear does NOT store users originating IP addresses when connected to our service and thus cannot identify users when provided IP addresses of our servers.” "
List of VPNs confirmed to log IPs
Banana VPN
Buffered
F-Secure Freedome
Faceless.Me
FlowVPN
FlyVPN
FreedomIP
HideMyAss
Hola
IdentityCloaker
Iron Socket
LeVPN
MyIP.io
PandaPow
PrivateWifi
SecurityKISS (10 days)
Speedify
SunVPN
SwissVPN (6 months!!!)
TotalVPN
Unlocator
VPN.ac (one day)
VPNBook (one week)
VPNLand (sign-up)
Not proven to NOT store IP Logs
Privatoria
Still have ProtonVPN. Glad to see they're not on the list, although you never know. It's hard to keep tracking of everything spying you when literally everything does it.I've been eyeing Speedify as my new VPN since they allow network bonding which would be extremely useful, and like all other VPNs they allege to not keep any user log activity. Have they been proven in court or no?
Oh I see, this answers my question. Dodged a bullet on this one, too bad.
tbh if you're using a VPN server inside American jurisdiction, you should just assume everything is being logged. If you want privacy, check different country laws and use the servers there. You can switch between them depending on your activity.This guy claims encrypted VPN traffic was interfered with, possible deep packet inspection.
That would be absolutely easiest way to do it. I use VPN exclusively in a virtual machine so gmail and other things that I need to keep running won't freak out and start sending me text messages about hackers.If you're just trying to route traffic through a computer that has the sole purpose of forwarding traffic with a specific VPN client, you could just use a virtual machine for that.
Even if you don't, odds are good it's going through Spook Central in Virginia at some point, like about half of all Internet traffic.tbh if you're using a VPN server inside American jurisdiction, you should just assume everything is being logged.
Unlikely. Fingerprinting works by a combination of device, browser and rendering info. Most of that stuff will remain the same unless you physically switch operating systems and actual computers each time. Find a browser that offers native counter-fingerprinting techniques. Brave does this by default by making a new fake 'fingerprint' every time you visit a website.Is web browsing on a VM an effective defence against fingerprinting?
Maybe if it's unaltered TAILS or something. Ordinarily I'd say use the most common browser but currently that's Chrome. Then Safari in a distant second. Probably a completely vanilla Windows install would be reasonably good. Just don't resize the window or any other number of things.Is web browsing on a VM an effective defence against fingerprinting?
That autistic asshole at archive.today was still able to detect Brave even when I faked User-Agent.Brave does this by default by making a new fake 'fingerprint' every time you visit a website.
It can help provide disinfo but you can also just have a dedicated browser to avoid fingerprinting or provide misinformation. Hardened firefox avoids pretty much all fingerprinting. You can test this by using the links below.Is web browsing on a VM an effective defence against fingerprinting?