关于虚拟专用网络的真相-您是否应该使用VPN?



您现在可以在https://www.patreon.com/thehatedone上为我提供支持,并获得更多独家内容的访问权。

大多数VPN提供商会告诉您他们的虚拟专用网络会使您匿名。但是不存在匿名VPN。如果您期望网络上的隐私和匿名性,是否应该使用VPN?如果要保护在线隐私,如何使用VPN?让我们找出答案。

比特币:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

短跑
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

莱特币
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

以太坊
0x6F8bb890E122B9914989D861444Fa492B8520575

今天,我将介绍拥有顶级加密和安全协议的最佳VPN提供商中的佼佼者,这些协议旨在为您提供Internet上的隐私权,甚至使您匿名。但这是真的吗?

VPN应该通过加密的隧道发送来确保您的流量安全,并为您提供其他IP地址,这样您的真实IP地址就不会透露给您所连接的网站和服务。

您的VPN提供商仍然可以看到您的Internet服务提供商可以看到的所有内容:您的所有流量,日志,设备,浏览器历史记录…阻止您的VPN提供商滥用此信息是您的承诺。虚拟专用网络按策略提供隐私,而不是按设计提供隐私-从技术上讲,这没有什么阻止您的VPN监视您的流量并随心所欲地对其进行处理-出售,限制或审查它。

没有VPN服务是匿名的。他们中的大多数人在注册时都需要您的电子邮件地址,并且大多数付款方式将直接显示您的身份,除非他们接受仅是假名的加密货币或可以真正匿名的现金。但是现金很少被接受,即使那样,您的VPN提供商也总是知道您的真实IP地址。因此,是的,它们更改了您的IP地址,因为它们也是您的单点故障,因此,如果服务器或整个VPN受到威胁,所有流量都将直接引向您的IP地址和设备。

一些来源:

https://www.theatlantic.com/technology/archive/2011/09/lulzsec-hacker-exposed-service-he-thought-would-hide-him/337545/
https://torrentfreak.com/purevpn-logs-helped-fbi-net-alleged-cyberstalker-171009/
https://torrentfreak.com/proxy-sh-vpn-provider-monitored-traffic-to-catch-hacker-130930/
https://www.bestvpn.com/privacy-news/no-logs-ipvanish-hands-logs-homeland-security/
https://www.theatlantic.com/technology/archive/2011/09/lulzsec-hacker-exposed-service-he-thought-would-hide-him/337545/

https://medium.com/@12504771/virtualshield-cannot-be-trusted-e5d054560699

信用:
CO.AG音乐https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA
Chuki Beats https://www.youtube.com/user/CHUKImusic

跟着我:

https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

视频中精选的镜头和图像用于批判性分析,评论和模仿,均受1976年美国版权法的合理使用法保护。

43 comments
  1. In my view and expertise as a security engineer it is not worth the money for private use. For professional use it is ok. For example if your connect from home to the server of the office, it is even recommanded to use a VPN, because your data is always encrypted. I recommand to use a pc or Imac. No Android devices from Google. They earn big money on collecting and stelling your data. Stay away from the Google Chrome browser, use Firefox instead + use add blockers and use common sense. Always keep your Internet security software up to Date. Clean regulary your browser history. Considering mails: do not open any fishy attachments, especially if you do not know the sender. However mailadresses can also being hacked and used by hackers. Try to keep the registration to websites as low as possible. Big creditcard companies and even servers of major banks have been hacked in order to steal information of their clients. Last couple of years, there is a trend of more and more identity theft. So do not allow People to make a copy of your identitycard or driving license. Example (this happened recently) There was a Nice house for rent. Potential Renters was asked for a copy of their identity card to make out the contract. What they actially did, was closing loans with banks on the name of those poor victims. Unaware the victims Got reminders that they had fallen behind with their payments to the bank. Since the victims can not proof it was not them, Who closed the loans, they are obliged to pay back these loans.

  2. I use nordvpn on my phone, connect to server in Asia and my google still show suburb im in? Obviously google is not fooled, they know my exact location despite the fact im connecting to internet thru asian server

  3. ExpressVPN app

    Secure & easy to use

    Asus RT-AC56(U/R/S)

    Asus RT-AC68U

    Asus RT-AC87U

    Linksys EA6200

    Linksys WRT1200AC

    Linksys WRT1900AC(S)

    Linksys WRT3200ACM

    Netgear R6300

    Netgear Nighthawk R7000
    All these recommended routers are open source software and firmware. setup your VPN inside the router and every device on you network will be protected. Since I have been using a VPN service I have never received another letter from my ISP about copy write infringement. I have tried 3 VPN services over the past 2 years Tunnel Bear was slow, Nord VPN was slow but faster than Tunnel Bear. ExpressVPN is 10 times faster than the the other 2 I listed. Give them a try
    https://www.expressvpn.com/

  4. If you use a VPN, and do anything within any other program that phones anything home, you are still giving up information. A VPN can just give you access to other countries content. Mozilla collects data, Chrome and anything Google does this too, even a weather widget on your desktop still has access to your system. Unfortunately, unless you write your own software to do something, no dice.

  5. There was a guy that accepted a challenge to saty hidden and he was doing well until they hacked him through tor (through tor rly if they can do that then no shitty vpn can save you )there is only 1 vpn that i believe works its called chaosvnn(however it dose not make you anonymous)its free if you can install it ….

  6. Perfect, except don’t fucking say Tor makes you anonymous. If you own entry and exit nodes, you can correlate the traffic. And hmmmmm, who would have a near infinite budget to set up hundreds of thousands of nodes…. ?

  7. so of course this being a giant advertisement for a vpn company makes this a non biased report huh? rofl. this is a 13 minute commercial for virtual shield which is a vpn company.

  8. Mozilla cannot be trusted. They built Firefox with the ability to add extensions remotely without your permission. No backdoors please!
    At the moment I'm using Brave and Dissenter for all my browsing needs.

  9. If you want to be completely anonymous on the internet, I am presenting you the best option, if you follow this, it’s 100% guaranteed. Don’t use the internet. Turn the WiFi router off, turn the internet off in the settings, and don’t use it forever. I am an addict so I am also trying to not use it that much, maybe in a couple of weeks, I’ll turn it off completely…

  10. It's true that most VPN service providers save data for a while as per the applicable local legislation. . . buuuuut :trollface: some don't.

  11. i use anon surf macc changer Vpns but the best of the very best is a full on proxy chain the hackers No 1 choice,works with iphone android and of course linux-my linux parrot security comes pre installed with everything even serving a proxy website etc …..for windows go to network settuings uncheck auto detect netwroks ettings and slect proxy go online find some proxies they all free look for norway as thats always faster copy the ip and port number paste to network settings click apply then ok = job done now yer running through a proxy this should work ok on windows any linux usrs shoulld already know how to set one up but if not YT some vids or search online…….proxy chains are by far rhe strongest most anon way to surf but as with all vpns and proxies expect a slight decrease in speed and expect captchas again iphone apple mac and linux can easily turn off or automate the captcha

  12. In Iran that a lot of website's blocked Iranian IP address we have no choice to use a VPN because it don't show are Iranian IP address
    THE TRUE USAGE OF VPN

  13. VPN technology has it's uses, but this is not it. You can run a VPN yourself to ensure all your mobile devices on other networks are routed via encrypted communication to your personal home network where you can safely access your other machines and use things like pi-holes on your mobile devices while on the go.

    For anonymity, TOR browser is a far better choice and to limit tracking methods, no-script and tracking blockers are pretty effective. You can even randomize your browsers identity if you wish.

  14. The real truth about vpns, the one nobody talks about: Ever get mad because your internet is particularly slow or cutting out one day? That will be every day if you are routing your traffic through a vpn

  15. i've reached the half point of your video and im already barfing on the amount of bs you're also feeding your users. I agree that people shouldn't straight up trust to be completely invisible when using a vpn, but the part about tracking everything is just baffling. If you're a normal person, you are "untraceable" because your actions are similar to very many people around you. Hiding any activities that single you out will be necessary to be anonymous, but hiding every information about yourself down to even being literally invisible is as good as hanging a sign on your head saying "im here". Thats an oddity that draws attention, thats a reason for you to be focused on and tracked, thats the opposite of being anonymous.

  16. I was so close to downvoting because you only talked about this privacy bullshit. Only in the last two minutes you started to talk about what VPNs are used for (you basically just mentioned the uses bnriefly). If you title your video: " The thruth about Virtual Private Networks – Should you use a VPN?", you should actually explain what a VPN is used for and why you should or should not use it. There are actually many vpn services that do not promote this privacy protection bs, but rather highlight what their service is used for. Your video was a bit misleading for me, as it didn't reflect its title at all. Next time, call it: " Why VPNs don't protect your privacy."

Comments are closed.