• Blackmist@feddit.uk
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 days ago

      In fairness I doubt the NSA give a single solitary fuck about piracy and aren’t about to give themselves up over a telesync rip of Beetlejuice 2.

      But probably best to plan 9/11 part 2 over something a bit more secure.

    • merde alors@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 days ago

      let’s say that VPNs are compromised and “they” know that you’re downloading “illegally”

      in order to prosecute, “they” have to prove you’re a pirate and show how they know

      would they compromise their backDoor to go after a tiny pirate?

      • hamid 🏴@vegantheoryclub.org
        link
        fedilink
        English
        arrow-up
        3
        ·
        6 days ago

        you don’t really need to scare quote they in this context. The NSA and similar organizations are real and operating at this scale right now.

        Will they compromise their back door to go after a pirate? No. Will they collect data on you to profile you and your activities and use that in the future? Yes.

        It is not if, it is when the digital police state is imposed will we know the real end state of this level of data collection. My warning about them is not just about the pirates, its about installing their software and letting them port mirror you and cache your dns calls for years to target you later.

      • sunzu2@thebrainbin.org
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        4 days ago

        Both are considered strong choices but again… This is 100% trust me bro.

        But that’s the people the bros chose to trust

          • liveinthisworld@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            4 days ago

            Technically speaking, VPN logs tend to include the IP address of clients connecting to them, after which the good VPN providers like Mullvad, IVPN and maybe PIA tend to purge them somewhere in their process. Now, if the VPN is running in a RAM-only node, then these logs probably don’t touch storage, which means there’s not much need to shred information from hard drives for the VPN provider.

            With that said, an ISP can technically log your traffic and see that you’re connecting to the IP range associated with a VPN. That and perhaps some more covert side-channel/correlation attacks can, in theory, compromise your identity.

            Of course, this is going deep into OPSEC and forensics, and I don’t think the NSA is that interested in the average Billy torrenting “The Office” to go through that many logs, even if the studios sue in court. Hence, technically your privacy is somewhat maintained with the good VPN providers, but you’re definitely not anonymous

            • Telorand@reddthat.com
              link
              fedilink
              English
              arrow-up
              3
              ·
              4 days ago

              That’s kind of my thought as well. It’s certainly possible someone might go through the effort to find a single pirate downloading The Lion King, but that’s a lot of effort (read: money) to find just one person.

              There’s certainly the possibility that an ISP could note that you connected to a VPN, but given that it’s not a remarkable event, since people connect to VPNs for all kinds of legal reasons, they aren’t likely to track your particular IP’s connection to a VPN apart from a court ordering them to care. They get paid their monthly internet plan price whether someone pirates or checks their email.

              If someone was running the Pirate Bay from their home servers, however, more parties would likely be interested in finding that person, and that person’s threat model probably exceeds just using a logless VPN.

        • socsa@piefed.social
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          5 days ago

          Everyone knows it’s impossible for the NSA to buy rack space in Bulgaria, where they literally don’t have to deal with any US legal process.

          It’s also impossible for the NSA to market such a service via pop-privacy blogs and social media profiles.

          The funny part about this is that the Snowden leaks showed that the NSA actually put a lot of effort into doing shit like this specifically to avoid all the paperwork which came with accidentally collecting data from US citizens. Keeping the data and analysis off shore means no pesky FISA paperwork.

          • liveinthisworld@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            0
            ·
            5 days ago

            As he said, paid with crypto and managed with his own keys. I don’t see how the seedbox provider can trace you if you do that, so there’s not that much to worry about

            • myersguy@lemmy.simpl.website
              link
              fedilink
              English
              arrow-up
              2
              ·
              4 days ago

              You’re going to connect to the seedbox at some point, which ties your IP to the traffic. If you are worried about a VPN attaching your IP to traffic, this is no different, no?

              • liveinthisworld@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                1
                ·
                edit-2
                4 days ago

                SFTP over TOR. This should be a requirement at this point.

                If you’re not doing that, then yes you’re technically right in that seedbox companies can be subpoenaed too. I usually use TOR to copy over what little I torrent.

        • Telorand@reddthat.com
          link
          fedilink
          English
          arrow-up
          0
          ·
          6 days ago

          What evidence do you have that no-log VPNs are compromised by the NSA? What about VPNs based in other countries like Canada?

            • psud@aussie.zone
              link
              fedilink
              English
              arrow-up
              1
              ·
              6 days ago

              Is your home machine, your phone, better protected than the VPN servers? I bet you’re not as good at IT security as the IT security staff VPN companies hire

              If your threat model includes nation state actors, you’re best off not using networked computers

              • sunzu2@thebrainbin.org
                link
                fedilink
                arrow-up
                1
                arrow-down
                1
                ·
                4 days ago

                I am all about good tinfoil but some of these people acting as if they are SNOWDEN lol

                Yes if feds wanted to catch you shitposting, watching big titied asian porn and downloading coldplay… I think there raised ways than compromising a VPN provider.

                Unless it is a honey pot, then use a different VPN provider. Gonna need trust at the end of the day.

            • Telorand@reddthat.com
              link
              fedilink
              English
              arrow-up
              1
              ·
              6 days ago

              The existence of the NSA and their activities is not proof that they have backdoors in VPNs. That’s bogeyman conspiracy theory shit—“they could be anywhere, therefore they’re everywhere!”

              You still haven’t answered the question, and I’m beginning to think you are making shit up based on paranoia.