Eh?! What’s wrong with downloading Linux ISOs?!
I’d have thought if anything it would be the high downloads and bandwith usage, which a VPN wouldn’t reduce, infact it ever so slightly increase your usage.
Or is it because you use a Torrent downloader and your ISP is to dumb to understand peer-to-peer != illegal downloading
One thing I am a little confused about, is why you are incrementing the ip address with the client. ie the server has 10.0.0.1/24 and the first client has 10.0.0.2/24. Is that assuming the clients are routers or something of the sort?
The VPN server is not hosted with your ISP in this situation, it’s hosted at AWS. This config (in theory) should encrypt your traffic from your ISP while maintaining control of the VPN server.
…I assumed it was fairly obvious that it was a joke, after using the term ‘Bazooka purchases’? lol
I think the other responders aren’t getting what it is you’re getting at. Perhaps this’ll help.
Specifically, it doesn’t do anything to increase your privacy. If you access the Internet from multiple places, it could increase your privacy in aggregate, but only in that it makes your specific patterns of Internet access come from one place instead of many.
If you mean self-hosted vs VPN provider, then the obvious would be that you are in control of your logs and you can verify that there are none generated.
If you mean accessing resources through a VPN vs public internet, well then it’s IP leaks, plus VPN access is a lot more secure (you’re not opening a public port giving it access to the public internet).
It’s more a joke that people often make when downloading copyrighted content via torrents. It’s all “Linux isos”
I use 10.0.0.2,3,4… to remember the IPs easier.
I know it was a joke, but if you’re concerned about privacy and self host a VPN then you’re not so secured.
Thank you. That’s literally what I was getting at.
Because it sounds like one of the VPN adverts about stopping hackers and protecting privacy. Using a self hosted one is eh better but it’s the same IP address and they know it’s you based off of browser fingerprints and habits/ cookies
But isn’t that just shifting where the entry point is? So it doesn’t increase privacy because you’re literally just changing your IP
The downside is you will have the responsibility of patching, watching for intrusion attempts, thwarting DDoS attacks, and maintaining a secure client side.
VPN providers often add a lot of value between ensuring accessibility from hostile networks to creating clients that enforce safe behaviors (like kill switches).
Wait, are you saying my Hannah Montana Linux isos aren’t real? /s
Oh, in which case yeah. I use a SOCKS proxy for mine, works well
I didn’t word my question right: does the /24 at the end not indicate that it is a subnet meaning that the clients are not individual computers but those of a network or am I just missing something with networking
Of course, I am. In this scenario, my grandma goes to federal hardcore-prison because it was her IP that was doing all the Bazooka purchases. I stay completely anonymous
Then put it in your grandma’s neighbor’s bedroom. Problem solved.
You may be confusing self hosted VPN with a VPN provider. A VPN is still based on a server/client relationship. With a VPN provider the server is controlled by the provider. You download and install the client and the client makes a secure connection to the server. The server could be keeping logs of your traffic. Whoever controls the server basically acts as your new ISP.
With a self hosted VPN, you install the VPN server on your personal PC on your LAN. Then you can install the client on a second device… Like a laptop. So when you are away from your home network you can securely make a connection back to your network over the internet and you can access your resources without anyone snooping on what you’re doing. You can keep your own logs… Or don’t. It’s up to you because you control the VPN server.
Enterprise environments do this all the time. I’m a computer tech for a public school system and we have our own VPN that we must connect to in order to access some organizational resources. We aren’t paying a VPN provider to create an encrypted tunnel back to our network for us. That wouldn’t be any more secure than no VPN at all. Well, I guess the level of security is dependent on the level of trust we have with the provider. But the idea behind encryption and security is that you shouldn’t need to trust a third party.
Is it true that a user’s public IP must be logged in order for WireGuard to work?
No. When using WireGuard, your public WireGuard IP address is temporarily left in memory (RAM) during connection. By default, WireGuard deletes this information if this server has been rebooted or if the WireGuard interface has restarted.
For us this wasn’t enough, so we added our own solution in that if no handshake has occurred within 180 seconds, the peer is removed and reapplied. Doing so removes the public IP address and any info about when it last performed a handshake.
If you want to hide your public IP even more, use multihopping.
It does indicate that is is a subnet, yes :).