Hello, all
I’m sorry if there is an FAQ somewhere. My VPN is about enter it’s yearly billing cycle and I thought I would come over here and see if anyone had a better suggestion. I’ve been using IPvanish for the last 10 years and have been pretty satisfied. I picked it by going into the darkweb and seeing what the criminals recommended to each other.
If anyone has other suggestions or tales before I renew, I would love to check it out.
Njalla, hands down.
Co-founded by Peter Sunde of The Pirate Bay fame. Run by a great little crew that cares about privacy. They do VPN, domains, and hosting.
Wireguard and OpenVPN. Your external IP periodically rotates through the pool, but at least all ports are forwarded.
Too bad almost nobody knows about them. They even have a Wiki page, ffs!
Hi just wanted to share these 2 links, since others have already answered your question:
Links should help you decide what to use for other apps as well.
I personally use Mullvad since I don’t need port fowarding, but it does come with full IPv6 support.
Mullvad, and if you need port forwarding like @[email protected] said protonvpn is decent too. Proton executives have had some controversial statements supporting trump though making me wary of them
https://nym.com/ is great.
I enjoyed mozilla vpn until a few months ago - seemed like every site in the world had their ips blocked; ended up rolling my own on a cheap vps.
How does the price of a vps compare to any other vpn. Surely this isnt as private?
I purchased a lowend vps for $15 USD a year. Correct, it is not as private - due to the singular ip; however, for my needs it works quite well.
Would you be willing to share which one can be had for that cheap?
Sure! https://softshellweb.com/shared-hosting looks like it’s $20 USD a year without a promotion/coupon. I bought a holiday special if memory serves me correct.
Airvpn is perfect for my needs (torrenting)
Top 3 for me are IVPN, Proton VPN and Mullvad.
I personally use Proton VPN because it has lot’s of servers to choose from.
I suggest using https://www.techlore.tech/vpn to compare VPNs and see which one has the features you want.
IVPN, Mullvad, or Proton. Criminals aren’t necessarily smart, I remember a ghost phone that criminals thought were secure and it was a honeypot. Shoulda used Graphene for free.
ANOM?
That sounds familiar
Two these are the goats. Figure out your use case and pick one.
encrochat?
Don’t know if Tor proxy front ends like Orbot or Carburetor count as a VPNs. If so, I highly recommend them.
Windscribe or Mullvad. I personally use Windscribe and it has some really good features and so far they have a really good reputation in privacy circles.
Proton or mulvad
Not one surfshark mention…
I love Mullvad but for some reason they refuse to add reverse split tunneling, so imo the only options are IVPN or Proton.
Reverse split tunneling gives you the ability of using the VPN only in the apps/programs you select.
You can set up split tunneling yourself if you run the wireguard/OpenVPN daemon manually and move the “mouth” of the tunnel to a separate Linux network namespace.
Last time I researched it I didn’t found easy answers. Do you have an easy script?
The exact script would depend on the use case; you’d use commands something like this:
mkdir -p /etc/netns/VPN sh -c 'echo nameserver 1.1.1.1 > /etc/netns/VPN/resolv.conf' ip netns add VPN ip link add tun1 type wireguard ip link set tun1 netns VPN
Because the wireguard device was created in the default namespace, it will “magically” remember its birthplace, even after you move its mouth (the tun1 device) to a separate namespace. The envelope VPN packets will keep going in/out in the default namespace.
ip netns exec VPN wg setconf tun1 /etc/wireguard/vpn.conf ip netns exec VPN wg set tun1 private-key /etc/wireguard/vpn-key.private ip -n VPN addr add 192.my.peer.ip/32 dev tun1
Get the wireguard config file from the VPN website, both mullvad and OVPN have a wizard to generate them. Your assigned private network ip is in the config file. Also get and save your device key.
ip -n VPN link set tun1 mtu 1420 ip -n VPN link set tun1 up ip -n VPN route add default dev tun1 ip netns exec VPN su myuser -c 'firefox --no-remote'
Now all firefox (and only that firefox) traffic will go through the tunnel. Firefox has its own DNS, if you run another app it will use 1.1.1.1.
I actually do the reverse of this - I create a namespace ETH and move my eth0 device in there and attach dhcpcd to it. Then I create the wireguard tun1 device inside ETH namespace, and move tun1 to the default namespace. Then any software I run can only use the tunnel, because the ethernet device doesn’t even exist there. This keeps the routing table simple and avoids a whole class of issues and potential deanonymization exploits with the split routing table used in traditional single-namespace VPN configurations.
mullvad but you cant seed while torrenting with it due to no port forwarding
Tailscale Mullvad combo
Firefox VPN is cheaper isn’t it, and funds the Firefox nonprofit?
Mullvad apparently no longer supports port forwarding. This better in tailscale?