Software developer/server admin here. I know a bit about this because we've been working with the tech lately to investigate firing up a VPN management system for a client.
Allow me to correct you. 1) OpenVPN/Wiregaurd/etc traffic is encrypted, so they cannot capture your packets. Or rather, they can, but they can't read them. 2) Most websites are on https/ssl now anyways, so most websites you go on the http requests and returns are also encrypted. Most messengers are also encrypted now. 3) There are services that offer double-vpn, so you are connecting first via UDP to one ip and then that IP connects to another - so there is no link between your computer and the end IP you are using. 4) Most VPN providers allow multiple users on one server/ip, so even if something is done from that IP and is SOMEHOW traced back to you - there is plausible deniability because there might have been 5 other users on that same IP. 5) In most cases no one gives a fuck what you are doing online to begin with, and no one is going to spend time tracing you because you called someone a nigger in a facebook post.
One thing to note, is you should ALWAYS use a private browser session when using a VPN. Otherwise, if you login to faceberg or jewgle with your VPN, you will get a cookie. When you disconnect from VPN, you will still have that cookie. Just about every website online is using google analytics now, so you will be trackable on every website anyways unless you are using a private session EVERY SINGLE TIME.
When VPN services get audited by the authorities, using a VPN only delays the inevitable if you've used it do some super illegal stuff, whatever arbitrary thing any particular government considers that to be
4) Most VPN providers allow multiple users on one server/ip, so even if something is done from that IP and is SOMEHOW traced back to you - there is plausible deniability because there might have been 5 other users on that same IP.
Same can be applied to CGNAT really, or WAN
Mostly all true but you are over complicating the topic.
THIS ENTIRE POST IS FALSE for valid HTTPS web traffic
HTTS is fully bidirectionally encrypted, if a valid SSL certificate. NOT EVEN THE VPN or ISP knows a single bit. All they know when you connect to Poal.co using https://poal.co are these three things :
1 : that you went to IP address 93.115.20.7 2 : that the IP address you went to first used port 443 and port 443 is only used by one site "poal.co" 3 : that after you went to port 443, you spent a lot of time on port 80 going to 93.115.20.7 sending fully encrypted data
EVEN THE URL in https is 100% military grade encrypted!
Those three meager tiny things are all that is known when using HTTPS. You are probably using https now, without a vpn.
https://en.wikipedia.org/wiki/HTTPS
A VPN that does NOT store logs, and NEVER appeared in US court records, and NEVER complied with FBI requests, and NEVER was hacked like NordVPN got hacked is ExpressVPN : https://www.expressvpn.com
expressVPN and other vpns are used to hide from your ISP :
1 : hides that you went to IP address 93.115.20.7 , so that your IS cannot tell the FBI or anyone 2 : hides that you first used port 443 and port 443 is only used by one site "poal.co" 3 : hides that after you went to port 443, you spent a lot of time on port 80 going to 93.115.20.7 sending fully encrypted data
WARNING TO CHINESE CITIZENS HERE : ExpressVPN is controlled by Chinese, openly so, so do not use ExpressVPN if hiding IP addresses from Chinese authorities.
HTTPS on A VPN hides EVERYTHING from FBI and ISP, but the VPN knows just the IP addresses you went to, nothing else!
TL/DR: The OP is a shill for the FBI probably!
Sure; but if you use a third party for your VPN they have the encryption keys and can turn over your data.
Even if they dont have the keys, They are perm MITM and can intercept handshakes, which are not uncrackable.
Dude up top is still correct, there are plenty of layer, but the problem is that a modern shithead such as myself prides themselves on being able to dig ALL THE WAY DOWN through a shitstorm of good intentions.
There is almost always a way, until you deal with PROs. Some folks are genuinely scary in their ability and knowledge of subsystems.
Boils down to: Pick your battles.
OP here. I'm that guy.
That's not how it works.
Number four is most interesting to me. I already knew about 1-3 and 5. I wasn't aware they allowed sharing of IPs. That's pretty cool!
The point of my post though is that IP happens at the networking level, and the ISP has free reign at the physical and data link layers below. All of the data, regardless of whether or not it's encrypted, is flowing through their equipment.
Cisco hardware, and probably many others, have had advanced capabilities to capture data for many years now regardless of who you're networked with. Governments and some companies have access to the private keys for the encryption certificates, so SSL/TLS, while important, still aren't a silver bullet.
I agree with you on number five, but that may not always be the case.
Shared IPs is a must when looking for a VPN. RARELY you'll encounter an odd issue but only really from small hosting websites that put a timer on downloads like 1 download per 8 hours etc. Sometimes chans you'll get flagged as a banned IP due to someone else's jew-shilling.
Other than that shared IP is a must.
Incorporated outside of (((14 eyes))) countries is a must.
torrentfreak does a good write up on most major VPN providers and a general write up on VPNs in general.
You're a bit misinformed regarding private sessions. Google still tracks you within those private sessions. In fact, they were recently sued for this.
(post is archived)