Anonymous Services - Can We Get A List Going And Feedback?

Discussion in 'privacy technology' started by DasFox, Nov 2, 2010.

Thread Status:
Not open for further replies.
  1. DasFox

    DasFox Registered Member

    Joined:
    May 5, 2006
    Posts:
    1,825
    I've only used Relakks and Swiss VPN.

    By the way what countries have the best privacy laws? I think this is something really important to discuss, after all why sign up for a service in a country that isn't going to offer great privacy...
     
  2. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    SuperVPN
    SuperVPN

    They offer IPhone, IPad and Android VPN and price starts at $4.
    Advertising they have servers in Russia.
     
  3. DasFox

    DasFox Registered Member

    Joined:
    May 5, 2006
    Posts:
    1,825
    I wouldn't recommend a USA company to anyone for VPN and many European countries either, or ones with servers in those countries as well, it's not good...
     
    Last edited: Dec 29, 2010
  4. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,696
    Location:
    USA
    Super VPN has bad WOT ratings.
     
  5. DasFox

    DasFox Registered Member

    Joined:
    May 5, 2006
    Posts:
    1,825
    What countries have the best privacy laws?

    Let's get a list of them PLEASE?


    THANKS
     
  6. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,696
    Location:
    USA
    Canada, and Germany are good. Panama was, but I believe they recently passed a law there allowing the United States access to data stored there of US citizens. So it may not be any better than Canada or Germany now. After looking at the map on the below link it appears that Greece is the best listed. That is if you can see the map at all. I'm looking at it on 32 inch screen, and can't see it well. I will see if i can find a better map.
    http://www.privacyinternational.org/article.shtml?cmd[347]=x-347-559597

    http://www.privacyinternational.org/
     
  7. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,696
    Location:
    USA
    Here is about as good of a list as you are going to find. This map is better, and more up to date. I just wish it gave more information about why each state received the ranking it did. https://secure.cryptohippie.com/pubs/EPS-2010.pdf
     
    Last edited: Dec 30, 2010
  8. DasFox

    DasFox Registered Member

    Joined:
    May 5, 2006
    Posts:
    1,825
    Forget Canada they have to close of ties to the USA and are practically in bed with them and as far as Germany is concerned, there's hardly a place in Europe worth trusting too...



    I've read this before, that doesn't really tell us much from a VPN standpoint...

    Judging from what I've seen and learned over the last 20 years, I'd take a bet that New Zealand and Iceland as probably two of the better places to run a VPN from...

    THANKS

    P.S. Something I just ran across;
    http://www.laquadrature.net/en/iceland-to-become-a-model-for-freedom-of-communication
     
    Last edited: Dec 30, 2010
  9. DasFox

    DasFox Registered Member

    Joined:
    May 5, 2006
    Posts:
    1,825
    I read this reply Steve made a few years ago here;

    For the least expensive solution for good anonymity, you want a full VPN connection, not just a simple SSL proxy. I would recommend ShadowVPN.com for full VPN ($10/m). You could also try SecureTunnel, as they have a solution but it isn't a vpn so your traffic may leak . If you want stronger anonymity, I suggest XeroBank's Internet Privacy or CryptoHippie.com's Road Warrior package. The latter two are very fast multihop networks, distributed encrypted servers, outside US/UK/EU jurisdictions, highest quality money can buy. In the interest of full disclosure, I am an advisor for XeroBank, and that is how I know where the holes are, and who the good competitors are.

    What is a FULL VPN?


    THANKS
     
    Last edited: Jan 2, 2011
  10. DasFox

    DasFox Registered Member

    Joined:
    May 5, 2006
    Posts:
    1,825
    Let's please keep this post alive and on the top, there are a lot of people that are into this and Xerobanks isn't the only service in this entire world offering a great VPN service :)
     
  11. SteveTX

    SteveTX Registered Member

    Joined:
    Mar 27, 2007
    Posts:
    1,641
    Location:
    TX
    VPN stands virtual private network. What it means is in this context is a vpn connection that captures all traffic exiting your computer and routes it to the remote network (your "anonymity provider" or "proxy provider").

    An SSL proxy is a route without any traffic capturing component to it. Only what you specifically direct towards the ssl proxy will go through the ssl proxy. Everything else will leak and not go through the proxy: ex: DNS, programs, skype, etc. which leaks your identity and breaks anonymity.

    An SSL proxy is an inadequate connection solution for anonymity and should be avoided unless you are a networking expert or have no need for anonymity when using a proxy.

    Inversely, a VPN is not an anonymity network, and not all VPN protocols are equal: some leak less (OpenVPN) and some leak more (PPTP / L2TP) than others. This is a point often conflated by vpn providers who call themselves anonymity providers. You may use a VPN connection to connect to a network, but if that network does not employ anonymity techniques, it is just a VPN connection and only provides pseudonymity, ex: relakks. And there are also anonymity networks which do not provide vpn connections, thus leading to a plague of privacy leak problems, ex: tor.

    So if you are wanting usable anonymity, you need 1) a full/real vpn connection, 2) anonymity network. Walk away from ssl proxies that claim anonymity, because they are lying to your face.
     
    Last edited: Jan 28, 2011
  12. DasFox

    DasFox Registered Member

    Joined:
    May 5, 2006
    Posts:
    1,825
    Ok, all this you just mentioned I know already and I just thought this 'Full VPN' was standing for something else, I see now it's your spin on it... :)


    THANKS
     
  13. searaider

    searaider Registered Member

    Joined:
    Apr 22, 2007
    Posts:
    61
    Greetings, i'm just trying Hotspot shield and it's working ok, well, almost, i've made a test in stayinvisible.com, it says i have an ip in the us, but it sees things that can compromise my anonimity, like the operating system i'm using, the language, time zone, browser among other things, so how can I hide all this?
     
  14. hierophant

    hierophant Registered Member

    Joined:
    Dec 18, 2009
    Posts:
    854
    You could use the Ixquick Proxy via https://eu.startingpage.com, but it doesn't allow Javascript. You'll look like every other user from the Ixquick IP that you get. Or you could use a virtual machine running a Ubuntu Desktop LiveCD. IME, VMware works best on Windows hosts, and VirtualBox works best on Ubuntu hosts.
     
  15. katio

    katio Guest

    From stayinvisible.com:

    That English or what?

    With JS disabled client fingerprinting and lots of side channel attacks are ineffective for the most part. If that renders "all modern websites" useless is something you have to decide.
     
  16. caspian

    caspian Registered Member

    Joined:
    Jun 17, 2007
    Posts:
    2,363
    Location:
    Oz
    I tried the ixqucik proxy once and logged into gmail. Gmail was not fooled. I think that was the same one but I don't see that option there now.
     
    Last edited: Feb 3, 2011
  17. katio

    katio Guest

    Did you also get a
    If so, duh.

    Also, not targeted at you but it needs to be said in this context: Don't mix personally identifiable online credentials and anonymity.
     
  18. hierophant

    hierophant Registered Member

    Joined:
    Dec 18, 2009
    Posts:
    854
    Once you log into Google, it can use non-IP information to locate you -- such as cookies, wifi router MAC address and/or login history that it retains. I'm sure that there's some formalism for reconciling and integrating that information.
     
  19. katio

    katio Guest

    Google lists the IPs used to log in, together with the country/city. If they can show your "true" IP instead of a proxied IP they know something which I don't.

    Cookies are pretty obvious to take care of but those and log in history can't be used because you could be on vacation for all they know. There is no reason for Google to show your "usual" location instead of where they think you are now. The MAC based stuff is a myth, it's opt-in, unless you allow Google to use the geolocation feature of your browser there is no way for them to see your MAC address (without hacking your system).
     
  20. hierophant

    hierophant Registered Member

    Joined:
    Dec 18, 2009
    Posts:
    854
    @katio

    Thanks. I stopped logging into Google long ago, so my experience is limited. Also, I tend to assume that they will do whatever I can almost imagine how they could do. Perhaps I've misjudged them.
     
  21. molz

    molz Registered Member

    Joined:
    Feb 5, 2011
    Posts:
    1
    Hi there !!
    I read most of the thread and wanted to post a few questions :

    So if i'm using vyprvpn (putting the option=>all trafic go through on mac) and that i also use tor, can i consider that there's not much more to keep privacy and anonymity ?? (except a more private vpn provider=> russian may not collaborate easily ??)

    Relating to Tor and the fact that someone on an exiting node can sniff the traffic... does using a vpn prevent from getting sniffed out of tor ?

    other idea : considering i have a mac : with vmware => building a virtual machine with a fresh debian or ubuntu, configuring TOR inside of this debian virtual machine so as to make it be the gateway (dhcp)...
    using another virtual machine (let s say backtrack) who will connect via debian and thus TOR before reaching the mac connection who is actually going through the vpn... Is that realistic ? Making sense ? stupid ? Best way ?

    What i dont understand is in this case (previous one): when datagrammes leave my computer what are there route (i tried to figured out using traceroute but didnt managed) o_O

    Are the paquets first going to my VPN provider and then travelling through TOR, ultimately reaching the web server i requested before coming back first to my provider then to me o_O or are they first going through TOR and then to my VPN provider (which would make the vpn useless) ??

    ps : sorry for my english which is not perfect...
     
  22. Medex

    Medex Registered Member

    Joined:
    Feb 5, 2011
    Posts:
    5
    Does anybody have actually experience with vpntunnel.se?
     
  23. DasFox

    DasFox Registered Member

    Joined:
    May 5, 2006
    Posts:
    1,825
    Your using the vyprvpn that is PPTP? If so ditch that, PPTP isn't as secure as OpenVPN.

    Also layering Tor on top of OpenVPN isn't going to provide you with any more anonymity, privacy or security, it's just a myth.

    Also I wouldn't trust using Tor because you're anonymous but not private. Forget Tor and get a decent VPN, not a pptp connection...
     
  24. hierophant

    hierophant Registered Member

    Joined:
    Dec 18, 2009
    Posts:
    854
    No. As DasFox noted, vyprvpn uses PPTP, and PPTP isn't very secure. You want at least an Open VPN based service.

    No, it doesn't, if (as I assume) the VPN and Tor are running on the same machine. In that case, you're connecting to the Tor entry node through the VPN, and then exiting Tor just like everyone else -- sniffable.

    I get that you want to access the VPN through Tor. That would protect you from evil Tor exit nodes. They'd just see encrypted VPN traffic. However, I don't know enough about Tor to say whether that's doable. Perhaps others here may know.

    Packets go through the VPN and then through Tor. The VPN connection is a virtual network adapter on your computer. Tor OTOH is an onion routing system. Its packets must leave your computer through an adapter -- either the VPN adapter or one of the real adapters.

    De nada. Neither is mine ;)
     
  25. katio

    katio Guest

    See this thread and the one linked in the first reply:
    https://www.wilderssecurity.com/showthread.php?t=280983
    The user quoted there has been deleted so some information and context is missing.

    In summary we concluded that you can do it both ways and it will depend on how you are configuring it. Do you set your browser's proxy to Tor or to the VPN?
    I have never done this myself and it's been a while but to my understanding it works like this:
    in-browser settings: vpn proxy with system level tor routing (on the firewall/gateway?):
    The traffic is sent to your vpn through tor, more to the point it will be encrypted, then sent through the tor network, leaving the end node still encrypted, reaches the VPN, there it's decrypted and sent to the final destination. That's what you want to do if you worry about eavesdropping end nodes.
    The big problem is how do you sign up for the VPN without revealing your true identity? If your VPN knows who you are there is no point in going through tor in the first place.

    The other way round improves your anonymity but does nothing to prevent plaintext eavesdropping in Tor: you configure your browser (or application/VM for that matter) to go through Tor. On the gateway everything is first routed to the VPN (who can know your ID through money transfer as he sees your personal IP anyway). There it's decrypted (the VPN part of the encryption), on each node another onion layer is pealed off till on the exit node your plaintext traffic is visible. Attacks against your anonymity inside Tor will then only reveal your anonymised VPN IP. Keep in mind some attacks like through Java can still break your complete layering, better use a VM than application layer routing.
    Adding yet another VM into the mix definitely improves your _security_ - theoretically! Because one general principle that can also be applied to security is KISS. Keep the complexity at a minimum and most importantly make sure you understand the underlying design of your setup... ;)
    Another principle is: Security is always a tradeoff (Bruce Schneier).
    It depends on your threat model how far you want to go.

    Well, that's how it all works out in my head. A I said I haven't done any testing myself and no sources other than the mentioned threads on the matter either. Apologies if I'm wrong, please do correct me.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.