this post was submitted on 04 Jul 2024
388 points (97.5% liked)

Technology

59675 readers
3753 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 11 points 4 months ago* (last edited 4 months ago) (3 children)

As a result, anyone wanting to access blocked sites from Russia is forced to use a VPN, a protective tunnel that encrypts internet traffic and changes a user’s IP address.

I hate how media describes VPN. It doesn’t “change your IP address” but rather makes your traffic appear to come from a remote endpoint when configured to do so.

I use VPNs all the time that don’t “change my IP address” at all.

[–] [email protected] 10 points 4 months ago (2 children)

They do change the source IP from the perspective of the host receiving your connection.

[–] [email protected] 1 points 4 months ago* (last edited 4 months ago)

But there's an important difference here. Sometimes you want the IP address to look like it's coming from a different location because of region locking. Eg Netflix.

Other times you want the origin IP hiding along the data stream to stop snoopers. eg the government.

So changing your IP from the perspective of the receiver isn't much use if you're trying to hide from the government. People who are not very tech savvy may not necessarily realize this important distinction until it's too late. So it's best to explain the difference.

[–] [email protected] 0 points 4 months ago (4 children)

I don't get it, why else would you use VPN if not to spoof your IP address?

[–] [email protected] 7 points 4 months ago* (last edited 4 months ago) (1 children)

To access a different LAN, e.g. a network at work, or your NAS at home. You configure it so your internet traffic still goes over your normal connection but only the LAN requests to the specific subnet goes over the VPN. This was the original use case they were built for (roadwarrior businessmen logging into their corporate portal from a hotel or whatever)

[–] [email protected] 4 points 4 months ago

This is the right answer.

[–] Willy 5 points 4 months ago (1 children)

when you want to be on a different local network?

[–] [email protected] 0 points 4 months ago

You won’t be “on a different local network,” you’ll be accessing specific networks (or subnets) via the VPN tunnel rather than some other network interface on your machine.

So if you’re at home with a 192.168.0.0/24 network and you want to access an office resource on the 192.168.141.0/24 network, likely what will happen is your machine with have a route to 192.168.131.0/24 via the network the VPN provides (let’s just say 10.0.0.1).

Depending on how everything’s configured, the server you’re accessing might see it coming from the VPN server (masquerade) or it could very well be passed on as-is (which would only work if the server has a routing table back to you via the VPN).

Typically when people use VPNs for internet access, the traffic is sent out masqueraded so that it appears to come from the VPN’s WAN IP address.

[–] [email protected] 2 points 4 months ago (1 children)

To ensure your unecrypted data(which is rare these days) is not clear-text in an untrusted network such as public wifi.

[–] [email protected] -2 points 4 months ago

Yes but this isn’t the point I’m getting at — VPN doesn’t always mean you’re sending all your Internet traffic down the tunnel. You can choose to configure only specific networks to use the VPN tunnel.

[–] [email protected] -1 points 4 months ago (1 children)

Are you talking about split tunneling?

Because last I heard it was considered bad as it was haibg a hard time deciding what traffic to tunnel and what traffic to not

[–] [email protected] 1 points 4 months ago (1 children)

It’s only bad if you’re splitting it incorrectly lol

[–] [email protected] 1 points 4 months ago (1 children)
[–] [email protected] 0 points 4 months ago* (last edited 4 months ago)

It doesn’t seem obvious to you who claims it’s “bad” because it “has a hard time deciding.” It can decide, guess how? Configuration