this post was submitted on 20 Jun 2023
127 points (97.7% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54669 readers
427 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
And encrypting your traffic so your ISP can't definitively see what you're doing. They can guess, but they can't definitively tell. That encrypted traffic is a shield for your ISP. When an IP holder demands something, the ISP can say it is encrypted and they can't read it. It forces the bulk of the work back onto the IP holder. If your VPN is doing what it claims to do, then the work of that IP holder gets extremely difficult to downright impossible.
The copyright troll would be sending the emails to the VPN provider's host. They won't even know who your ISP is.
Exactly this - the troll will never know your ISP, so you literally cannot get a notice.
Every site on earth has been using https for multiple years. The only thing that is visible to your ISP has been the server's address for a while. VPNs just got encrypt that as well, but that's about it.
And yet, if you use a cheapo VPN with a well-known address (shared IP) sites like Amazon, or even Wikia will block you. Why? If most of your information is 'private' anyways, why go through the step of preventing a potential customer/user just because of their IP?
Because in reality, even such a minor thing as a dinky $3/month VPN is a huge headache for people trying to farm relevant information from you. Public Cookies, Basic Telemetry, and really any sort of ad-relevant data is pretty much publically available to any interested party, and even the simplest VPNs screw that up to a large degree.
People don't go out of their way to spend a couple of bucks on a VPN and reserved IP because they think they're gonna defeat the CIA or become a Net Ghost, they do it to get around region locks, IP bans, localized pricing (and yes to pirate their favorite movies/video games).
This isn't why. They refuse service because a large part of DDoS, scam and generally unlawful trafic comes from VPNs (because the criminals are the ones interested in masking their true IP, for police evasion). If your site has a payment form, it is financial suicide to not block common VPN IPs because carders will use it to test their ill-acquired cards. If your site has a way to make a request that cost a lots of resources, you want to block VPN IPs because otherwise your site gets DoSed to hell and back by anyone who has a problem with you. The collateral damage of blocking people who deny you one data point to track them is completely acceptable to these businesses.
P2P communications by their nature require the receiver and sender to know what is coming and from whom. When you're on a torrent that *anyone* can jump into and ask for the IP of everyone involved and what is being torrented, having that extra layer of obfuscation is paramount to protection, especially in countries with strong IP law enforcement. Stick that VPN in another country rather than your own, and suddenly the barrier to entry for most is going to be too high to get their hands on the information they desire.