this post was submitted on 28 Jun 2023
5 points (63.2% liked)
Privacy
32177 readers
532 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
How is it different from split tunneling?
Seems that it's automatic split tunneling by application/stream. And with multiple out nodes. So basically split tunnel + tor? Still requires that you trust the app itself, the exit nodes, every node along the way, etc...
Sounds dangerous
Yeah, I'm not onboard... I'd rather vet a single company (vpn provider) and keep track of their goings-on rather than trust that a system with many actors are trustworthy with no incentive to be. A VPN provider that claims to not track logs... but gets found out that it does.... dies. There's a direct incentive here.
This system? There's no way that the money you pay for this SPN service is making it to all the exit/traversal nodes. There's nothing that would stop any given node from being malicious... forget just basic vetting of each node would be a massive cost alone. We can trust encryption... but we already do that with https and other protocol level stuff too. At that point I might as well just trust my ISP if I have to infer trust into each node like this.
I get tor... I get it's uses... I don't get how this is adding all that much more to the topic from a security perspective if it's only "tor-like" (not using tor nodes). Tor still has it's own issues as well.