@dushman Makes it impossible for hackers to see the websites you visit (because HTTPS has never existed).
@inference
Also when it comes to data collection you just shift your trust from your ISP to the VPN company
@dushman I trust my ISP more than a VPN company I saw in an ad. It doesn't matter if their server software is open source or proprietary; you can't see if they're actually running that code or not, without access to their servers, which you aren't getting unless you work there.

VPNs are overrated.

@inference
If you live in a country like Russia or China, ISP is the least trustworthy entity. VPN company is at least in some developed country's jurisdiction and has zero obvious incentive to do DPI of all your traffic and report your actions directly to the KGB. They might not even know who you are. I can't say for Nord as I hate them, but for other reasons. With Proton you can pay in cash or these Beethoven thingies.
VPNs are still good in certain cases.
@dushman

@m0xee @inference
If I had to I'd use mullvad or set up my own on a vps that doesn't require personal info

@dushman
Mullvad's also good, one of the best!
I chose Proton because I was using their free plan and when they had a sale I just went with them. They have some unique features like this one: protonvpn.com/blog/stealth-vpn
I haven't inspected it properly yet, but it doesn't look like one of the "military grade" claims 😅
I do live in Russia, here most popular VPN services are blocked, but this Stealth protocol seems to work. Wireguard TCP also seems to work, WG UDP and OpenVPN are filtered.
@inference

@dushman @inference @m0xee to be fair, most any will have to follow a court order, use an actual anonymization network and pseudonymous email if thats your concern, no companies are gonna ignore the law so blatantly
@may @inference @m0xee
It's more about their marketing claims being misleading
@dushman @inference @m0xee i would argue its not a stretch to assume they mean by default, considering court orders are court orders ¯\_(ツ)_/¯
@may @inference @m0xee
Also this bit is pretty misleading as well. Means nothing as soon as you send an email to a different domain. Only applies if you and your recipient are using pgp.
Follow

@dushman
From what I know, even without using PGP they have an option to send encrypted e-mails to third parties. You set a password that you have to pass to the destination party using some other channel of communication, the e-mail itself only contains a link in this case, and the password is used as a decryption key so the message can get decrypted in-browser on opening the link.
But of course it's not the default.
@inference @may

@dushman
Here is an article on this feature: proton.me/support/open-passwor
I've never tried it myself, but it does seem legit. Well, if you trust browser-based cryptography 😅
@inference @may

Sign in to participate in the conversation
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml