I can understand the argument against bandwidth, but how do you conclude that it is not anonymous enough? Even against a VPN?
I can understand the argument against bandwidth, but how do you conclude that it is not anonymous enough? Even against a VPN?
Maybe I should have said “it’s not anonymous based on your threat model”
Technically speaking, VPN logs tend to include the IP address of clients connecting to them, after which the good VPN providers like Mullvad, IVPN and maybe PIA tend to purge them somewhere in their process. Now, if the VPN is running in a RAM-only node, then these logs probably don’t touch storage, which means there’s not much need to shred information from hard drives for the VPN provider.
With that said, an ISP can technically log your traffic and see that you’re connecting to the IP range associated with a VPN. That and perhaps some more covert side-channel/correlation attacks can, in theory, compromise your identity.
Of course, this is going deep into OPSEC and forensics, and I don’t think the NSA is that interested in the average Billy torrenting “The Office” to go through that many logs, even if the studios sue in court. Hence, technically your privacy is somewhat maintained with the good VPN providers, but you’re definitely not anonymous
For anonymity, yes. Sure you might fool Google trying to match your IP to your traffic but that’s about it
SFTP over TOR. This should be a requirement at this point.
If you’re not doing that, then yes you’re technically right in that seedbox companies can be subpoenaed too. I usually use TOR to copy over what little I torrent.
That shouldn’t be possible in theory unless I don’t know it well enough. Care to provide a screenshot?
It’s called an outproxy
Man, why is everyone like this? Please read the documentation, the traffic is encrypted and metadata cannot identify you. Unless the NSA has an active hack for I2P lying around, NO-ONE IN THIS WORLD can find out what chunks of traffic just went flying by your internet connection
As he said, paid with crypto and managed with his own keys. I don’t see how the seedbox provider can trace you if you do that, so there’s not that much to worry about
Unless you PGP-encrypt everything by hand you’ve just lost the fight
Thanks
Link broken?
Tell me more about this special proxy
They’re getting sued right now
They should stand up for themselves which should in theory help pirates
They’re getting sued though. They don’t need to stand up for us; them not taking shit is just acting as cover for us
True, but I could also get a beefy seedbox for $60 a year
Can I trust Deezer to not fuck it up? There were reports a while back that when checked in a spectrogram (or something) that Deezer was packaging fake FLACs by upsampling some other codec
I’m out of ideas on who else needs to sue nhentai
What you’re talking about is supposed anonymity in obfuscation, and that has been proven to not work.
Also, most VPN companies keep logs and can be subpoenaed. Not all, but most. I2P is meant to anonymize your traffic, so I do not see the point of your statement