Virtual Private Networks, or VPNs, are popular services for (supposedly) increasing your security and privacy on the internet. They are often marketed as all-encompassing security tools, and something that you absolutely need to keep hackers at bay. However, many of the selling points for VPNs are exaggerated or just outright
Another reason to use a VPN is that ISPs have every motive to sell your browsing data and they do. Unlike many other groups tracking you, your ISP inherently has your meatspace name, address, and payment information making their data easily collatable and very valuable.
If you use the default DNS on their provided router they can even tell if someone purchased an XBox, Playstation, or any other smart device just from update and telemetry lookups.
As the article says, by using a VPN youre using someone else’s ISP making that info worthless.
If your threat model includes preventing ad networks from gathering data, a VPN absolutely is a tool to prevent that. Do you have to pay for a service? Probably not if you’re technical enough; a VM in a data center is probably sufficient.
That sounds very illegal under the GDPR
Oh, if us in America were as privacy minded as the EU. People here gladly hand over every bit of data about themselves either to feel safer or just to save 10 cents on groceries.
Yep. BIG deficiency in this article. I don’t use a VPN because of shadowy “hackers” who sit in front of their keyboards with a pistol and a balaclava. I use it because ISPs and governments have demonstrated they can’t be trusted.
Yeah, part of it reads like he was paid to do it, just without including obvious marketing links so he can claim in the article that he wasn’t. Ending the article with valid use cases seems like preventing anyone saying he left out valid reasons, but after a wall of text that could make less savvy users do a “TL;DR: VPN not needed” before they got to that part. I’d respect it more if he led off with the same short description of valid uses, especially considering the article title, then pivoted to where it could be irrelevant.
Direct report from the FTC. ISPs are DIGGING into your web behavior. https://www.ftc.gov/reports/look-what-isps-know-about-you-examining-privacy-practices-six-major-internet-service-providers
Where are you getting free VM hosting?
also, i feel like most of your argument is rendered moot with encrypted dns solutions like DoH.
The comment was in reference to VPN services. Sadly, given theres no right to privacy, you must pay to not be tracked.
You misunderstand. Large ISPs run their own DNS servers which are preconfigured into the devices they sell. They are the intended recipient and you’d just be encrypting it in transit to their servers.
i don’t think many ISPs even offer encrypted DNS, i’m talking about using a third party dns. you can set up a standard dns endpoint that uses DoH upstream to the server of your choice. cloudflared makes this really easy if you are happy using their dns, and you can even have it sit upstream of something like pihole, giving your whole home network dns tracking protection and ad blocking without the overhead of a VPN.
Um, those aren’t cost-free.
Oracle Cloud has a free tier and this video shows you how to set up your own VPN there. I wouldn’t really recommend this as a free VPN solution though. If you need something that’s free, go with Proton VPN’s free tier, Proton is pretty trustworthy and they are very upfront about their business model…
You could also just set your DNS to one of the many free DNSSEC providers. That’s even more secure because there are fewer middle men who can track you. After all, while your ISP may not be able to see that DNS traffic, if you arn’t using DNSSEC anyway then your VPN and their upstream provider can.
Besides, nearly all tracking nowadays uses third party browser fingerprinting, which a VPN does nothing about. Practically, a VPN is far more security theater than actual security.
Also, isn’t it funny that sending all your data though a second nation where it no longer legally counts as Amarican internet traffic became really well advertised right after a major scandal came out where the NSA was illegally monitoring American traffic, and more protections were put in place to keep them from doing it again?
You don’t even need the VPN company to be in on it, a group like the NSA can pretty easily compromise a “no logs” VPN’s technical infrastructure or that of their upstream provider, and they’re even got people who feel like they have something to hide to self select for it to cut down on the amount of boring traffic in the first place.
This is absolutely not what DNSSEC is. DNSSEC provides authenticity of the response, not privacy. You’re describing a means of encrypted name resolution, like dns-over-tls, dns-over-https, etc.
Right, I had just responded off the top of my head and got the name wrong. Point still stands.
Potentially, but precision is important, especially if you’re going to make sweeping claims about a topic, acting as an authority.
Thank goodness we absolutely know for certain that no VPN would ever sell your browsing data.