帶PIA的Raspberry Pi VPN路由器



這是我已經使用了一段時間的東西,以為我會向您展示整個過程,這是設置樹莓派vpn路由器的教程。謝謝你的看法!

○○○鏈接○○○

Raspberry Pi 3►http://amzn.to/2oquADd

私人互聯網訪問►https://goo.gl/StVNEU

Novaspirit郵寄►https://goo.gl/JbRztf

○○○給我發送東西○○○

唐Hui
郵政信箱765
紐約州法明維爾11738

○○○其他影片○○○

Microcenter牽引►https://www.youtube.com/watch?v=-SsL89kxwJ4

HiKey 960評論►https://www.youtube.com/watch?v=bxNe9bBXWO4

水冷Ryzen 7 Build►https://youtu.be/dKY2F-yu5e8

RPi觸摸屏►https://youtu.be/M0p4oTChKEc

語音被谷歌迷戀►https://www.novaspirit.com/Lc2Fb

Google Assistant按鈕觸發器►https://novaspirit.com/ICsME

樹莓派上的Google助手►https://novaspirit.com/TX9TF

在Raspberry Pi上運行Mac OS►https://novaspirit.com/faVd1

kali linux更換?鸚鵡OS►https://novaspirit.com/3f2iY

GeChic攜帶型顯示器►https://novaspirit.com/pyLVF

在Rpi上安裝Desktop Minecraft►https://goo.gl/nmLhKJ

patreon @ https://patreon.com/novaspirittech
鳴叫我:@ http://twitter.com/novaspirittech
面子書:@ http://facebook.com/novaspirittech
Instagram @ https://instagram.com/novaspirittech

免責聲明:此視頻和說明包含會員鏈接,這意味著,如果您單擊其中一個產品鏈接,我將獲得少量傭金。這有助於支持該頻道,並允許我們繼續製作這樣的視頻。謝謝你的支持! 。

35 comments
  1. Is this video tutorial still valid or is there an update to this? I』m very interested since PI 4 has come out

  2. How does the hardware setup work?

    Is it: My regular router connects to the Pi(per wifi or usb ethernet) > The Pi is connected to a switch > The switch connects all my devices?

  3. what kind of logs and other infos is saving on the device in this kind of setup? Lets say it should be a forensic analysis, what info can they get? before connected devices? times for the connecting?

    IF what kind of options are needed to do?

  4. What about just drop all iptables rules to avoid config one by one. Since your router is in a secure LAN and not expose to the Internet, I mean not being used as a default gateway form your ISP, I think there is no need of iptables rules. Am I wrong?

  5. Hi. I know is an older video but I want to try this out with a rpi3. Unfortunately it seems there is an issue with dd-wrt and openvpn…
    Question: would it be a good idea to have to Ethernet connections? One built in and o e via usb to Ethernet.
    To separate the network and have the router after the rpi3 VPN gateway?

  6. i know this is pretty old now, but i got it working but its showing me as being in the united states even though i used ipvanish-AU-Sydney-syd-a01.ovpn in the setup, what am i doing wrong?

  7. very helpful but I think its time for a updated version. Some things where not needed, and recommend you use PIA dns servers and not google. Done mine on Ubuntu vm.

  8. Awesome video! I was wondering could you not just forwards the gateway from the router and have all the devices that are counted to the router just get forward that way instead of having to go into each devices settings and having to input the the information ?

  9. I was using PIA for 1 year and had no problems at all, then I switched over to NordVPN… God, that was a huge mistake… It's very unstable, a lot of the times my latency is very high and sometimes I've to keep hopping servers to get a good connection. And there were moments it couldn't connect at all!

  10. Hmmm… This VPN thing is a little like the infinite regression problem. Moving the third party to someone else like PIA or a cloud hosting company running your own VPN is fine but doesn't solve the core problem. The core problem is X (you) want to exchange data with Z (nefarious online source) and must go through Y to do so securely. Well Y will always have logs, data and records then right? They do the VPN and get the unencrypted data…

    So what's needed is for Y's copy of the data to either also be encrypted…or for them not to keep records, logs or data by the very nature of the data exchange.

    Now call me an old cynic if you like, or paranoid, but if you really wanted nobody but X to have full sight on the exchange? (And Z but they wouldn't know where its going) Well, I can smell a blockchain application in there somewhere y'know. I mean its a blockchain trust issue right?

  11. Thanks for the great video! I was actually trying to do that with TOR but I don't know about the IP Table and stuff… could you please do a video about that or maybe a few useful links to tutorial? I couldn't figure it out searching in the web.

Comments are closed.