Hacker News new | past | comments | ask | show | jobs | submit login

This is always topical: Don't use VPN Services

https://gist.github.com/joepie91/5a9909939e6ce7d09e29




> Your IP address is a largely irrelevant metric in modern tracking systems.

I don't believe this for one second.

Your IP address on its own is not sufficient to identify you. That doesn't mean your IP address is not helpful in identifying you.

If you have Javascript disabled, it is a heck of a lot easier to identify you with a combination of an IP address, user agent, and OS than it is to identify you without the IP address cutting down the pool of potential visitors.

On top of that, if you're targeting me and do a geo-location of my IP address, it will get you within 5 miles of my house. That's close enough that you'll know which county I'm in, which with a few other easily-obtained pieces of information will let you pull up my voter registration, which will give you my exact street address.

Of course, you could mitigate this by setting up your own VPN on something like Linode, but unless you're regularly rotating IP addresses, you've just traded a pseudo-identifier that multiple people/devices share for a persistent identifier.

This argument comes up all the time, and I have never heard anyone explain it in a way that passes my sniff test. If you want me to stop using a VPN, you need to do a lot better than just claiming that IP addresses don't matter -- you need to show some kind of evidence to back that up.


If you have Javascript disabled, it is a heck of a lot easier to identify you because you're one of the very few who disabled Javascript.


Eh. If you're enabling JS because you think it's going to help you blend into the crowd, I am skeptical that you understand how powerful JS fingerprinting actually is, particularly around cache abuse and super-cookies.

You don't need to go all the way, but the very least I would advise turning on the resist-fingerprinting config in Firefox. At a minimum, block things like canvas/webGL. You're making yourself more identifiable by doing so, but the alternative is worse.

Now, if you're not using a VPN, and you're in a rural area, and you're on Linux/Firefox with Javascript disabled -- sure, I definitely buy that I could do some pretty decent correlation with that info. That's why VPNs (for all their flaws) still matter.


Sure, I do understand that, and yes IP hiding does matter. I'm merely pointing out that disabling Javascript (and eventually enabling some set unique to you, to un-break a broken site) is just another way to leak some bits one might want to be aware of. Faking the common fingerprinting vectors known to expose you uniquely is possibly a better way... until the new ones are found. I don't know. The leaking bits need to be carefully accounted for, and you don't know the site userbase for sure to blend into the largest cluster possible. I don't think that fingerprinting is something that can be fought by the end user efficiently, besides the very obvious things like blocking the major vectors.


That's a good point.

> Faking the common fingerprinting vectors known to expose you uniquely is possibly a better way...

I wish there was more research being done around this. I appreciate what Firefox is doing, and I assume there are good reasons for their fingerprinting strategies. They know more than me about this stuff. But... it still sets off some alarm bells in my head. It seems like it would be strictly better to spoof location/canvas/microphone data instead of only blocking it.


Yes and no.

Disabling javascript is like wearing a ski mask in a crowded mall.

It makes you much more obvious and easier to track, but harder to identify on the outset.


Are there really so few of us? It feels like there should be millions of us: https://addons.mozilla.org/en-GB/firefox/addon/noscript/


modern "web apps" written purely in tens of MB of javascript complicate it a bit


But who wants to put in the effort to develop tracking for non-JS users? In reality, most will just ignore the few users that don't want to be tracked. Even ublock origin should be enough for most.

However, IP is certainly used. I know of a few cases where IP is at least used as a filter. Most websites won't see that many users from one IP address.


> Your IP address on its own is not sufficient to identify you.

Wasnt there a story yesterday that FBI tracked some a guy who had logged into Jihadi forums with the IP, knocked on the door with a copy of a passport of the guy's dad.


> Because a VPN in this sense is just a glorified proxy. The VPN provider can see all your traffic, and do with it what they want - including logging.

So can my ISP and they have been confirmed to sell customer data and work directly with NSA.

https://en.wikipedia.org/wiki/Room_641A

https://www.theguardian.com/business/2016/oct/25/att-secretl...


Pick a cloud provider you trust. I was thinking of moving from Digital Ocean (US) to Hetzner (German) and setting my own VPN up through a normal server.


I've pondered this before, but I don't see much advantage in having my traffic which currently comes from many IP addresses as I roam about the world, many of them shared and constantly changing, all come from one IP address that is absolutely only me.

Plus browsing the web from a hosting provider is a worse web; you'll get more sites rejecting you or putting you through bad CAPTCHAs all the time because the same service you can rent a server from, so can all the spammers and scrapers and other bad actors, so you're pretty likely to end up in an IP space with bad reputation.

If anyone can argue me out of this position, go nuts. I want this to work and do something useful, I just can't convince myself it does even with that bias.


This worse web is literally Google bullying you unless you tell them everything about who you are.


No, that's a different web. I live in the "google bullying" web between my combination of using Firefox + uMatrix on desktop, Brave on Android, and DuckDuckGo as my search engine. Google gets very little of my desktop info and fragmentary mobile use only. I do a few extra CAPTCHAs but it's not too bad.

The "I think you're a bad actor" web is much worse. Ask Tor users.


Sorry, I confused the two. I'm out here using Tor for my privacy (good kid; didn't do nuffin').


If you're in the US, how exactly does moving from a US host to a German host make you more secure?

At least there are a few shreds of controls remaining on US agency surveillance of US persons using US networks.

But there are absolutely zero controls on monitoring networks beyond US borders, so it's open season for non-US hosts.


>If you're in the US,

not just US location or even US services .. it's hard to be secure when we know that the US gov is reading and storing everythign they can.

In comparison -- the EU is not. The EU has the opposite approach and takes data privacy very seriously. This is backed up with effective legislation.


Just because the host is in the EU doesn't prevent the US from monitoring it.

EU hosts are almost certainly monitored even more by US agencies than US hosts.

GDPR doesn't fix any of this.

"Europe furious, 'shocked' by report of U.S. spying"

https://www.cnn.com/2013/06/30/world/europe/eu-nsa/index.htm...


Why are public cloud providers more trustworthy than VPN providers? Some VPN providers are sketchy but not all of them.


It's not that they're more trustworthy it's that you have more control. They could be feeding traffic to the NSA as well but you can encrypt it yourself -- with VPN services like Nord you're relying on other people to do that for you but often VPN services can offer convenience services like country switching etc but if security is what you're after then cloud providers and setting up your own VPN seems like a more reliable alternative.

To the people looking to setup a simple http proxy in three steps:

1. Set up a server instance who's IP you know and have configured ssh.

2. In Browser: Manual SOCKS Proxy: 127.0.0.1: your_chosen_port

3. In terminal: ssh -i ssh_key -D your_chosen_port user@ip_address


> You are on a known-hostile network

Which is precisely the use case I use a VPN for.

I'd rather trust an at least somewhat trustworthy VPN provider with my data than a random coffee shop and clients who happen to be on the same network at the time.


I feel like that's crazy. There should be no traffic entering or leaving your machine that's not end-to-end encrypted already. Trusting some fly-by-night VPN provider because they buy a lot of YouTube ads is no substitute for proper end-to-end session level encryption.


Simply seeing what servers you connect to can reveal a lot about you. Where you work, what social media accounts you have, what apps you have installed, what you are interested in reading etc. HTTPS doesnt help you with that.


"Dont use VPN services"

then at the bottom: So then, what?

THIS TYPE OF VPN


Which is not a service, but a self-hosted open source solution.


Yeah much better, a server that the user will probably not be talented enough to secure and will forget to patch the OS, libraries or application itself. /s


Analogy: "Don't eat at restaurants if you want to control your food."

"If you for some reason cannot do that, here is a way to set up a food truck"


Analogies are imperfect, but I think the intention was more like "If for some reason you cannot do that, here is a simple meal you can make in your own kitchen."


More importantly, don't do anything private on a networked computer. As the daily breaches show, there is no such thing as computer security in 2019.


This article tries to enumerate the use cases for use of commercial VPN services, but misses out my only use case of these services: evading geoblocks. It seems fallacious to me.


It absolutely ignores government's censorship, though. I use NordVPN simply because I want to access resources that would be otherwise banned for me.


It also ignores that some VPN services have proven their no logging claims in court, multiple times.


A strongly-worded gist, but my sole use case is avoiding DMCA notices. VPN still seems like a good solution for that.


The article is slightly more nuanced... know when and why to use VPN is more accurate. As mentioned near the end of that article, using known or suspected hostile networks, like public WiFi is a good reason to use VPN.


The problems addressed by avoiding a locally hostile network by connecting to another, globally hostile network is solving a very limited, nuanced set of problems.

Unless you're VPNing to your home or office, these public providers are just asking for trouble. They're too cheap to run well.


Yes, you can run your own VPN... that’s a great solution.

Also public WiFi attracts low hanging fruit sort of exploits. Incentives for the VPN company that already makes money, to actively hack and exploit your machine are significantly less.

It’s not a privacy issue, it’s a security issue.


Exactly. Run your own. I setup and teardown vpn's all the time, takes about 5 minutes to launch, a min to teardown via simple cloudformation script.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: