this post was submitted on 13 Sep 2024
530 points (95.5% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

53939 readers
239 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder


💰 Please help cover server costs.

Ko-FiLiberapay


founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 7 points 6 days ago (3 children)

Are you suggesting that it's pointless to use a VPN?

[–] [email protected] 1 points 4 days ago (1 children)

For anonymity, yes. Sure you might fool Google trying to match your IP to your traffic but that's about it

[–] [email protected] 1 points 4 days ago (1 children)

How so, specifically for logless VPNs?

[–] [email protected] 3 points 4 days ago* (last edited 4 days ago) (1 children)

Technically speaking, VPN logs tend to include the IP address of clients connecting to them, after which the good VPN providers like Mullvad, IVPN and maybe PIA tend to purge them somewhere in their process. Now, if the VPN is running in a RAM-only node, then these logs probably don't touch storage, which means there's not much need to shred information from hard drives for the VPN provider.

With that said, an ISP can technically log your traffic and see that you're connecting to the IP range associated with a VPN. That and perhaps some more covert side-channel/correlation attacks can, in theory, compromise your identity.

Of course, this is going deep into OPSEC and forensics, and I don't think the NSA is that interested in the average Billy torrenting "The Office" to go through that many logs, even if the studios sue in court. Hence, technically your privacy is somewhat maintained with the good VPN providers, but you're definitely not anonymous

[–] [email protected] 3 points 4 days ago (1 children)

That's kind of my thought as well. It's certainly possible someone might go through the effort to find a single pirate downloading The Lion King, but that's a lot of effort (read: money) to find just one person.

There's certainly the possibility that an ISP could note that you connected to a VPN, but given that it's not a remarkable event, since people connect to VPNs for all kinds of legal reasons, they aren't likely to track your particular IP's connection to a VPN apart from a court ordering them to care. They get paid their monthly internet plan price whether someone pirates or checks their email.

If someone was running the Pirate Bay from their home servers, however, more parties would likely be interested in finding that person, and that person's threat model probably exceeds just using a logless VPN.

[–] [email protected] 3 points 4 days ago

Maybe I should have said "it's not anonymous based on your threat model"

[–] [email protected] 3 points 6 days ago (2 children)

At least if the company is run from the US

[–] [email protected] 4 points 4 days ago* (last edited 4 days ago)

Everyone knows it's impossible for the NSA to buy rack space in Bulgaria, where they literally don't have to deal with any US legal process.

It's also impossible for the NSA to market such a service via pop-privacy blogs and social media profiles.

The funny part about this is that the Snowden leaks showed that the NSA actually put a lot of effort into doing shit like this specifically to avoid all the paperwork which came with accidentally collecting data from US citizens. Keeping the data and analysis off shore means no pesky FISA paperwork.

[–] [email protected] 2 points 6 days ago (1 children)
[–] [email protected] 7 points 6 days ago (1 children)

Because if the government wants that data then they are gonna get it. If it's in another country its a lot more work than just serving them a warrant like it is if they are USbased

[–] [email protected] 6 points 6 days ago

At least that's a more reasonable answer than trying to imply the NSA has backdoors everywhere.

My position is that it all depends on your threat model. The government isn't likely to go after someone who torrents files and is hidden by a VPN. The government might go after someone running a streaming site, on the other hand.

And even that might wind up with a dead end. AirVPN (for example) is Canada-based, has no logs, and accepts both crypto and anonymous cash payments.

[–] [email protected] 3 points 6 days ago (2 children)

Yes, a hosted seedbox paid with crypto and self managed keys is the way to go for torrenting

[–] [email protected] 12 points 6 days ago (2 children)

If you are worried about VPN's, why are you not worried about seedbox providers?

[–] [email protected] 1 points 4 days ago (1 children)

As he said, paid with crypto and managed with his own keys. I don't see how the seedbox provider can trace you if you do that, so there's not that much to worry about

[–] [email protected] 2 points 4 days ago (1 children)

You're going to connect to the seedbox at some point, which ties your IP to the traffic. If you are worried about a VPN attaching your IP to traffic, this is no different, no?

[–] [email protected] 0 points 4 days ago* (last edited 4 days ago)

SFTP over TOR. This should be a requirement at this point.

If you're not doing that, then yes you're technically right in that seedbox companies can be subpoenaed too. I usually use TOR to copy over what little I torrent.

[–] [email protected] -1 points 6 days ago (1 children)

I am not worried about my torrenting traffic. I am worried about installing their software on my machine and giving them wide access including port mirroring.

[–] [email protected] 1 points 4 days ago

if you can't connect to a vpn using only open source software, that's a crappy vpn

[–] [email protected] 5 points 6 days ago (2 children)

What evidence do you have that no-log VPNs are compromised by the NSA? What about VPNs based in other countries like Canada?

[–] [email protected] 3 points 6 days ago* (last edited 6 days ago) (1 children)

the US has so much geopolitical reach that companies in canada or elsewhere would just hand over the question if it was high enough profile.

[–] [email protected] 4 points 6 days ago (1 children)

That's an interesting point, but I think the "if it's high profile enough" is key. People torrenting files is probably low on their priorities. On the other hand, somebody organizing a terrorist cell is probably much higher.

Companies might have an interest in finding pirates, but it would not be as easy for them to get other companies to comply with their subpoenas.

[–] [email protected] 4 points 5 days ago

yeah if ur just a dude pirating, it probably doesn't matter, but if they find you've done a large crime, you can bet your ass that shits getting yoinked from you.

companies might, but that's almost entirely through legal processes. ceast and desists, required reporting, etc...

[–] [email protected] -5 points 6 days ago (3 children)

You might have heard about Edward Snowden? Have you looked into anything that he leaked?

[–] [email protected] 13 points 6 days ago (1 children)

The existence of the NSA and their activities is not proof that they have backdoors in VPNs. That's bogeyman conspiracy theory shit—"they could be anywhere, therefore they're everywhere!"

You still haven't answered the question, and I'm beginning to think you are making shit up based on paranoia.

[–] [email protected] -4 points 6 days ago* (last edited 6 days ago) (1 children)

Go ahead and use these services. I don't care about you, what you do or what you think. You are deeply unserious if you are not paranoid about the surveillance and I really have nothing to discuss with you.

[–] Syntha 7 points 6 days ago (1 children)

Is there literally any evidence that the US government managed to extract useful information from no-log vpn providers in the US?

[–] [email protected] 2 points 5 days ago

I have (anecdotal) evidence that they, in fact, can't extract useful information from one particular no-log vpn provider in the US, PIA. They showed up to seize data, but walked away empty-handed when they found out that they are, truly, no-log and their servers run entirely from RAM, so no drives to extract data from.

[–] [email protected] 8 points 6 days ago* (last edited 6 days ago) (1 children)

You didn't answer the question. Your behavior is toxic.

[–] [email protected] -5 points 6 days ago

My behavior is toxic because I am saying VPN services aren't safe? OK whatever. I really don't care what the fuck you do. Go ahead and pay money for these services 🤷‍♀️

[–] [email protected] 2 points 5 days ago (1 children)

Is your home machine, your phone, better protected than the VPN servers? I bet you're not as good at IT security as the IT security staff VPN companies hire

If your threat model includes nation state actors, you're best off not using networked computers

[–] [email protected] 0 points 4 days ago

I am all about good tinfoil but some of these people acting as if they are SNOWDEN lol

Yes if feds wanted to catch you shitposting, watching big titied asian porn and downloading coldplay... I think there raised ways than compromising a VPN provider.

Unless it is a honey pot, then use a different VPN provider. Gonna need trust at the end of the day.