User Tools

Site Tools


communication:security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
communication:security [2017/10/27 00:39]
frater_secessus [your connection to the net]
communication:security [2020/10/11 19:48] (current)
Line 4: Line 4:
   - the data is unencrypted at any point along the route   - the data is unencrypted at any point along the route
  
-**Short version:**  if you are using a secured website (banking, finance, medical, email, etc) it doesn't matter how you get there.  The transmitted data is [[https://en.wikipedia.org/wiki/Transport_Layer_Security|encrypted end-to-end]]:+**Short version:**  if you are using a secured website it doesn't matter how you get there.  The transmitted data is [[https://en.wikipedia.org/wiki/Transport_Layer_Security|encrypted end-to-end]]:
  
 > You could have an airplane write the transmitted data in the sky and it would still be safe.  You could tattoo it on your face and it would be safe.  You could paint it on the side of the empire state building and it would be safe. -- secessus > You could have an airplane write the transmitted data in the sky and it would still be safe.  You could tattoo it on your face and it would be safe.  You could paint it on the side of the empire state building and it would be safe. -- secessus
Line 41: Line 41:
  
 The real value of a VPN is:   The real value of a VPN is:  
-  * hide one's IP address from the world in order to foil geolocation +  * hide one's IP address from the world in order to foil geolocation.  A common example is you want to use a streaming service not available in your country. 
-  * hide traffic from an employer, ISP, or someone else //in the first few hops//.  It does not increase security for people already using secured websites since those are already encrypted.+  * hide one's IP address from the world to complicate identification.  Maybe you are a political dissident, pirate, etc.  Maybe you are just a private person. 
 +  * hide traffic from an employer, ISP, or someone else //in the first few hops//.  Maybe you want to avoid content-related throttling. 
 + 
 + 
 +Those with a *nix shell elsewhere and a bit of skill can use [[https://duckduckgo.com/?q=ssh+tunnelling&ia=web|ssh tunneling]] as a "poor man's VPN" Windows users typically run [[https://duckduckgo.com/?q=ssh+tunnelling+putty&ia=web|putty]].
  
 ==== what about Three Letter Agencies ==== ==== what about Three Letter Agencies ====
communication/security.1509079170.txt.gz · Last modified: 2020/10/11 19:48 (external edit)