Well, just that. Wich is stronger against trackers, hackers and doxxing threats? Proton VPN (I’m using this one actually), or Mullvad VPN?
Mullvad. Not even a question
Also, the Proton CEO publicly supports Trump
Mullvad.
Proton has a Trump ass kisser working in their C-suite.
Okay, but how does the political stance of Proton workers affect my privacy?
At the moment, it doesn’t. He could decide to violate Swiss law and turn data over to Trump.
That would certainly affect your privacy.
Correct me if I’m wrong, but he doesn’t have the power to do that. Proton has a board with many members calling the shots.
There are sellouts and traitors.
Andy done some bootlicking… I guess whoring for the regime is supposed to print generally but I don’t think he understands his user base lol
Imagine
I prefer Mullvad. Regularly audited, can pay with cash if preferred, everything runs on RAM, and hasn’t had any controversies so far. The only issue for some is no port forwarding. I also like the multi-hop and DAITA features.
IVPN imo, just because it offers reverse split tunneling, if you prefer having more countries to choose from you can use Proton.
deleted by creator
Tor Browser
Why isn’t the Tor browser more popular here?
See my other comment; I think the same user contingent that likes VPNs tends to also want maximum convenience, which isn’t Tor. Of course they frame convenience as the only relevant factor, instead of acknowledging that being the tradeoff they’re making.
It’s generally slow as fuck
Bruh, good luck trying to watch a youtube video, or even just browse a news article.
Tor only works for a small number of sites.
I haven’t really played around with VPNs to make the comparison. Tor breaks for a significant number of sites, but it’s still a pretty small minority; “only works for a small number of sites” is a comical untruth.
If Tor breaks more sites than VPNs do (which I think is likely), I think it is because Tor is secure. It is easier to do malicious things behind Tor because you have, for all intents and purposes, an unbreakable shield of privacy while you are doing those malicious things. And so, site operators tend to block it more readily than they do VPNs.
Whether you want to make the tradeoff in favor of convenience or genuine privacy is, of course, up to you. It’s not surprising to me that the Lemmy userbase is more or less unanimous in favor of convenience. Of course it is fine if you want, but you don’t need to misrepresent how things are to make it the only possible choice.
I think you’re exaggerating. Disabling JS breaks way more sites than an exit node’s IP.
Edit: I meant that “small number” of sites is an exaggeration, not that exit node blocking is uncommon.
They still see source of email and meta data.
I am not sure why they would ban account for getting links tho
100% Mullvad
deleted by creator
Mullvad does have split tunneling on Linux and Android. I don’t know about Windows.
deleted by creator
servers run on RAM
What’s the different with zego logs alternatives, e.g. https://openvpn.net/as-docs/tutorials/tutorial--turn-off-logging.html
deleted by creator
What data if there is no log?
Mullvad. It’s cheaper than Proton. But Proton has more servers. Like Proton even provies Indian IPs, but the servers are hosted in Singapore, which may be something people need, as Mullvad do not have any servers with Indian IPs.
You can also try IVPN, it is almost same like Mullvad, no email for account, pay using Monero etc, but you can get a one week subscription for $2.
A VPN is a VPN, having a different IP address is equally effective against those things no matter which IP it is. The issue is whether or not anyone can associate that IP with yours, and what that comes down to is how willing they are to give up their records when the government asks nicely (or, even more importantly: not so nicely.) I’m not familiar enough with either service to be able to speak to that, but everyone else seems to be talking about features, prices, politics, etc when none of those directly address your questions.
False and fake information.
lol, k, I definitely respect the opinion of someone who drops a half-assed comment like that without bothering to offer what they believe to be the correct information.
I can’t presume to know what they meant, specifically, but I think they’re probably referring to the fact that a VPN provider has access to all of the data you’re transmitting through their exit nodes, and a malicious one could harvest and sell it. Or work with LE and hand over all tracking data, all information about your browsing habits for the past year, all of the times you visited PornHub and Grinr, how many times you visited that trans support website… everything LE could get by surveiling your behavior if you weren’t using a VPN.
A VPN is only worth how trustworthy the VPN provider is. Mullvad, for instance, claims to keep no logs, so a search warrant for logged data is useless. This is not true of all VPN providers.
If that’s the case then both of you failed to read the part of my comment where I explicitly addressed that:
The issue is whether or not anyone can associate that IP with yours, and what that comes down to is how willing they are to give up their records when the government asks nicely (or, even more importantly: not so nicely.)
I admit I didn’t include the possibility of the VPN operator themselves being malicious, but it seems weird to call me out for not addressing the issue of record security re:governments/LE when pretty much the entire point of my comment was to address that specific issue because no one else was, no?
You start with “a VPN is a VPN.” However you qualify it, it’s not true unless you’re merely stating a tautology, which doesn’t seem constructive or helpful.
You ever notice how it sometimes helps to read the whole sentence to understand what some part of it means in context?
A VPN is a VPN, having a different IP address is equally effective against those things no matter which IP it is.
There’s a comma after that second VPN so obviously it’s related to what follows, which is the part where I describe exactly how a VPN is a VPN: in terms of getting a different IP address. This is twice now you’ve gone way out on a limb here trying to back the play of some fucking troll who didn’t bother to explain themselves and I’m not sure if that’s where you want to be. Picking through my comment and taking bits out of context to feed back to me as ‘evidence’ to back up your pedantry and assumption that the rest of the text of that same comment shows you to be wrong about is not a good look. If you’re going to nitpick my shit to death then you should at least try to read the whole thing and understand how each of the parts relate to each other first, otherwise people might mistake you for some fucking troll too (albeit a clearly slightly more intelligent one since you can actually elucidate what your issue is with what I said, regardless of whether or not it’s remotely accurate.)
Wow. You are a capital-D douche.
Mullvad of course. Proton is American right?
Proton is Swiss.
Exception when gargling orange.
Ok. Better.
Doxxing is a low skill level threat its very easy, google your target’s username and find information about them, yeah its that simple. All your user data is linked to your user name and profile picture. What i suggest doing is using the same tools doxxers use (sherlock) to find your long forgotten accounts and then delete them, remember to never use the same username and profile picture.
When a database leaks it will most likely contain your username, email and ip address, this information will be findable by username, email or ip address. If you ever use an account without a vpn using a vpn wont anonymize you from the service. Disable webrtc in your browser it often leaks ip addresses while using vpns also watch out for ip grabbers.
Tldr: dont use same usernames and profile pictures, vpn is 100% secure if used wrong.
I like Mullvad better
Trackers are browser problem, get ublock origin. You can block trackers by changing your dns resolver i recommend Quad9 or adguard.
You don’t really get hacked unless you download and open files or your accounts get recovered by someone sending all your information to customer support pretending to be you.