VPNs

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.
Mullvad has an email client as well?
No, its a pure vpn client, but if you use linux there are opensource proton bridges you can use, though if you fear the big noses comming after you, id reccomend staying off that service. although thats almost all services unless you decide to host your own, then again that will bring other issues
 
  • Agree
Reactions: Aidan
No, its a pure vpn client, but if you use linux there are opensource proton bridges you can use, though if you fear the big noses comming after you, id reccomend staying off that service. although thats almost all services unless you decide to host your own, then again that will bring other issues
I think they're literally asking for an email provider recommendation. It's tangentially related because I allowed my view of ProtonMail to color my impression of ProtonVPN -- they just went the other direction and treated it as an anti-recommendation for ProtonMail itself.
 
Last edited:
Mullvad, VyprVPN & Mysterium VPN seem like the current meta for people too stupid to hide their IP without paid software.
 
I think they're literally asking for an email provider recommendation. It's tangentially related because I allowed my view of ProtonMail to color my impression of ProtonVPN -- they just went the other direction and treated it as an anti-recommendation for ProtonMail itself.
cock.li is pretty good and has lots of domains to choose from. You need an invitation but I have three left. DM me if you want one. Can't promise it will stay up forever but it's been trustworthy so far. I think @skykiii is the one who asked?
 
cock.li is pretty good and has lots of domains to choose from. You need an invitation but I have three left. DM me if you want one. Can't promise it will stay up forever but it's been trustworthy so far. I think @skykiii is the one who asked?
I am, but I'm gonna wait until I see if I actually overcome my laziness and make my artistic aspirations pan out. Otherwise you could end up wasting one of your invites on nothing.
 
I am, but I'm gonna wait until I see if I actually overcome my laziness and make my artistic aspirations pan out. Otherwise you could end up wasting one of your invites on nothing.
I would take the offer while you can; if you're trying to build a reputation, then your address should somewhat resemble your alias without being on an @loves.dicksinhisan.us domain. Cock.li has many domain, but most of them are not professional appropriate, so better claim the handle before someone else does (unless you're using something nobody else would ever think of).

It's my understanding that invites get replenished every once in a while so he'll get them back eventually, and at that point you'll also be able to pay it forward and invite other people as well.
 
I would take the offer while you can; if you're trying to build a reputation, then your address should somewhat resemble your alias without being on an @loves.dicksinhisan.us domain. Cock.li has many domain, but most of them are not professional appropriate, so better claim the handle before someone else does (unless you're using something nobody else would ever think of).

It's my understanding that invites get replenished every once in a while so he'll get them back eventually, and at that point you'll also be able to pay it forward and invite other people as well.
Ah, now that I know that's how it works, I'll take @AnOminous up on his offer if he's still willing.
 
VPN's can and will throw you under the bus when the right amount of legal or law enforcement pressure is put on them.

Scenario 1:
In my opinion it's best to hide in plain sight while using the right amount of opsec depending on your individual situations. For instance, if you're merely downloading torrents and shit posting then use 'novelty' identification to gain a debit card, acquire a mobile isp and a vpn. Or socially engineer access to someone else's connection that you can run your purchased vpn on. Or just use your own debit, if you're only downloading torrents or talking shit online use the standard opsec to cover your ass.

Scenario 2:
If you're a high profile target (spy, journalist, investigator, hacker etc) for whatever reason, then it's best to hack nearby wifi using a range of methods from social engineering to cracking via cantenna with signal boosters. Then connect to your own privately built vpn network (specifying how may appear as fed post so I won't say, so just do the research), tech knowledge being assumed.

Scenario 3:
You're a pedo, map, kiddy diddler or call yourself "child friendly" and really need to stay anonymous online. Then I have an excellent solution for you but first you need to reply to this message with your full name, address and one of my highly enthusiastic sales professionals will sneak into your house at 3am for a presentation of our services.

Scenario 4:
One morning you woke up and your medication was stolen by crack whore sally and you went full schizo by dinner time. Now is the time to dump all your technology in the nearest garbage bin after having destroyed it, make a go bag and head innawoods. You can live off the land, play harmonica for music and entertainment. Then get adopted by a tribe of animal fucking hippies whose ultimate goal is to create a literal underground society where you can all live in peace for the rest of your days without those bothersome mind reading microwaves.

In Closing:
One thing is for sure, never assume any vpn (not even a service from another country) won't flip on you when their ass is on the line. There is no such thing as a trustworthy vpn. Because at the end of the day they will preserve their own money and freedom so never think a vpn service will martyr themselves for little ol you.
 
Ah, now that I know that's how it works, I'll take @AnOminous up on his offer if he's still willing.
Sent.
In Closing:
One thing is for sure, never assume any vpn (not even a service from another country) won't flip on you when their ass is on the line. There is no such thing as a trustworthy vpn. Because at the end of the day they will preserve their own money and freedom so never think a vpn service will martyr themselves for little ol you.
Remember, "no-log" VPNs may indeed be telling the truth, but it's retrospective. They may not keep logs. But if you're retarded and you glow, when they get legal process telling them to turn your dumb ass in, they will turn you in the next time you log in. They aren't logging, they're turning you in in real time.

So don't glow, dude.
 
So what I'm understanding from @DickSanchez is:

If all you're doing is torrenting anime -- just use clearnet. Anime companies don't care.

If you're torrenting major Hollywood blockbusters -- a VPN may protect you but its a crapshoot.

If you're doing international espionage -- then you'd have to be the worst spy ever to be using consumer-grade stuff.

If you're a kiddy diddler -- don't bother, all the anonymity in the world won't save you from the Devil.
 
  • Agree
Reactions: DickSanchez
Sent.

Remember, "no-log" VPNs may indeed be telling the truth, but it's retrospective. They may not keep logs. But if you're retarded and you glow, when they get legal process telling them to turn your dumb ass in, they will turn you in the next time you log in. They aren't logging, they're turning you in in real time.

So don't glow, dude.
At least in Switzerland, Proton is a case study in the government compelling a service provider to log things they normally didn't because they had the capability to do so.
My take on the value of "no log" providers is that they're at least less likely to have logs going back years and likely even months which is more than can be said with an ISP of any kind.

If all you're doing is torrenting anime -- just use clearnet. Anime companies don't care.

If you're torrenting major Hollywood blockbusters -- a VPN may protect you but its a crapshoot.
I've not torrented over home ISP clearnet in over a decade, there are more values in using a VPN than just not getting a letter from your ISP for torrenting capeshit and oriental cartoons. At the very least use custom DNS which is free and easy to do.
If you're a kiddy diddler -- don't bother, all the anonymity in the world won't save you from the Devil.
You don't hear about the ones who never get caught. Realistically, using Tor properly is enough. Every major case I know of with a dark web pedo getting got is because they slipped up.
 
Last edited:
At least in Switzerland, Proton is a case study in the government compelling a service provider to log things they normally didn't because they had the capability to do so.
My take on the value of "no log" providers is that they're at least less likely to have logs going back years and likely even months which is more than can be said with an ISP of any kind.


I've not torrented over home ISP clearnet in over a decade, there are more values in using a VPN than just not getting a letter from your ISP for torrenting capeshit and oriental cartoons. At the very least use custom DNS which is free and easy to do.

You don't hear about the ones who never get caught. Realistically, using Tor properly is enough. Every major case I know of with a dark web pedo getting got is because they slipped up.
Well yes there are some well trained degenerates in the world who go to great lengths to be sick fucks. However, even the smartest ones who flee to other countries using fake identities have been caught with the right amount of media and legal pressure. So it's really a matter of how bad any government or law enforcement agency wants to track them down. Add in the coming age of AI where all the data that is currently collected can and will be parsed, searched and analyzed in real time, no longer requiring the slow human investigative process.

As for TOR being secure, even if someone were to use the strictest of opsec without making any mistakes they are still relying on the entrance and exit nodes, or the entire system for that matter. Unless you take the time to check out all the nodes in your region (which nobody does) and read the source code for anything suspicious in the TOR browser (which nobody does) then you are assuming safety under the veil of "open source". Just recently TOR has enabled java by default which that alone should raise red flags, but I suppose convincing anyone who really really really wants to use TOR for that dopamine rush is like convincing a drug addict not to use a shared needle. The familiarity (or addiction in case of addict) with a habit, ritual, product or service is so powerful they will convince themselves nothing can be wrong. Let's not forget that TOR was and still is a military created service.

But let's pretend for a second that TOR is the ultra bad ass super secure network people want it to be. Well, you still have to keep in mind all the baked in spyware within windows and yes potentially Linux (read the source code lately? does anyone? ) can correlate your user profile (keystroke fingerprinting, style of speech, location data and much more) to the "anonymous" user profile on TOR. e.g. unknown user exits node in same city matching location of isp and/or vpn connection which matches to the secretly reporting operating system that says tor being used and matches the exact amount of data being transferred and received.

However, I will still go with, "pretend I'm wrong even about that.."
Well you still have the fact that every computer, laptop and mobile device since 2005 (maybe earlier, reference tpm) has been outfitted with remote control and spying ability at the hardware level itself. Ever reverse engineer your cell phone or laptop to see what it's doing? Most people don't and usually opt in for brand loyalty and corporate feelz. "My brand would never betray me, I'm an informed consoomer!"

So anyone who hasn't been arrested is either not doing anything that big brother really gives a damn about, poses no threat to the established order or simply being allowed to operate either as unintended pawns in a mass social engineering narrative (fall guy or good guy) or they are being allowed to operate so they can later be caught and be used as examples as to why more freedoms need to be taken away and why the surveillance state needs to grow.

When it comes down to it, all we can really hope is that we are the ones that pose no threat and therefore do not aggro "the gaze of Sauron" so to speak. But it's certainly not [insert favorite brand here] that is keeping anyone anonymous or secure. So depending on how each individual uses the internet usually dictates the amount of opsec and security they will need. But for anyone to assume safety or security due to brand or service loyalty, or common fallacies like, "been playing russian roulette for years and im still alive, why stop playing now?" may surprise themselves one day.
 
@DickSanchez You're a victim of assuming the "all-seeing eye" is real. Not worth talking about boogeymen techniques that are conjecture.
 
@DickSanchez You're a victim of assuming the "all-seeing eye" is real. Not worth talking about boogeymen techniques that are conjecture.
It's established fact backed by mere google searches and common sense you're too afraid to use. But I totally understand your point of view. Ignorance is bliss and the seemingly unknown can be very scary for some people. It breaks the barrier of your personal comfort and forces you to take a leap outside the established norms and narratives that you have been spoon fed all of your life. You feel invalidated and need others to validate your reality. But unfortunately personal reality is not actuality.

So I don't blame you staying where it feels safe. Not everyone is built to observe and think for themselves.
 
  • Autistic
Reactions: Aidan
Just because the ATF can drive a tank through my front door doesn't mean that I shouldn't put a lock on it.
I never suggested that a VPN should never be used. It's clear you reacted without reading anything. Or worse couldn't grasp the very basic point I made. I said good opsec, vpn use among other suggestions should be catered to specific users depending on what they use the internet for. But I made it clear to never just blindly trust any vpn, meaning "don't be a brand loyal dumb ass and do dumb ass shit on the internet thinking your vpn will protect you over protecting themselves".

tl/dr: don't be a brain dead zoomer consoomer
 
I'm going to second or third or fourth or fifth or whatever the recommendation about Mullvad, as I just signed up there and in addition to the independently audited security etc. of the site, it's one of the clearest and most concise and informational of signups and even informs you of things like Brave's "secure DNS" actually being a DNS leak if you're using a VPN (so turn it off when using a VPN).

The UI is also a model of clarity and makes doing fairly arcane things like split tunneling easy.

And it appears to have other capabilities for using OpenVPN or WireGuard when not using the client directly.
 
Agreed with Mullvad. I'm pretty happy with it so far, and I've been using it surf for the last several months. I used to use Proton VPN, but their service was mostly slow and had a lot of countries/servers locked behind paygates (~10 euros/month). With my experience, the speed issue pops up mostly for free customers (because every free plan is jammed into the same 100 servers); the internet connection is only marginally slower for paying customers.

Mullvad is 5 euros/month in comparison, and I don't notice a difference in my connection speeds when comparing it to non-VPN speeds. I also like the huge variety of wireguard servers and countries that you can choose. I liked the Kill Switch and multihop options.

Both VPN plans offer split tunneling where you can choose (on Windows or Android) what programs go through the VPN and which doesn't, which is nice.
 
Back