Comments by "Bond25" (@Bond2025) on "Now THIS is What a Private VPN Looks Like" video.

  1. Privacy and Anonymity are completely different. Tor was compromised in 2013, users can be identified by rogue nodes and traffic staining techniques. That is why GCHQ runs a lot of Tor Nodes. The Tor Browser Bundle was altered, possibly with the agreement of the developers to assist Law Enforcement with Operation Onymous in 2014. All the default security settings were changed to the lowest level and scripts were turned on. The script feature was also left operating despite the setting being set to off/blocked in later releases - to assist further with police investigations. The way it worked was that sites run a script when a user connected and the Tor Browser Bundle firefox sent replies outside Tor, back to Law Enforcement. Certain sites were given ID numbers and once the user connected, firefox run the script and identified the real IP address of the person. Tor Project would never answer questions over this. They also presented for download a version in November and December 2013 that had a "profiler trojan" built in, but only identifiable by Kaspersky antivirus at the time, because that company would not assist with exposing users. Some sites had pictures and videos that were modified, so they would cause a video player or picture viewer program to call for extra resources or a CODEC. Unless you blocked this or set VLC, for example, to connect out on a random IP and Port, you would be connected to Law Enforcement and they tracked you. Other files were just remote access trojans and law enforcement just sat watching what users did. VPNs are dangerous. YouTube affiliates only advertise them as they earn up to 40% of each referral. Most are only Proxy Servers, not VPNs. They operate on rented equipment in datacnters like M247 Ltd - who are forced to hand over all data in the UK at the request of police with a Production Order. The VPN collects, inspects, manipulates and redirects your data and sifts through to see if there is anything they can add to a user profile. Some VPNs want email addresses, phone numbers, WifI info, contact lists, PRECISE LOCATION and also your credit card details as your verified profile is sold for more. Even if the VPN doesn't collect all your data, the Host Company can and does sell it to whoever wants it A VPN only hides the IP, technology has moved on in the past 10years, now it is possible to trace anyone anywhere. Security Services can locate a person using facial recognition, using input from doorbells, CCTV, phones, ANPR etc. They can also tell who is with you if you are talking near a phone or alexa, or some TVs.
    17
  2. 5
  3. They know all the guard nodes too, what you might want to look at is the settings to make Tor settings look like Microsoft update data. This can help on DPI/DPI systems, but newer ones cross reference the traffic and IP, so it is pointless depending on who you are hiding from. A guard node is as insecure as an exit node. I could set one up and inspect and modify traffic. Police and Security Services in the UK do this all the time. Look how many sites that are aimed at privacy still insist on the lowest security settings on Tor Browser and demand scripts are run! That is so they track you and know your real ID. A lot of exit and middle nodes are run by GCHQ and NSA to play with. They can stain traffic going in to see where it comes out, so get the real IP that way. Two university students were threatened or paid not to give a talk on how to de-anonymise Tor users when they went to DEFCON. The talk was pulled as it would have revealed users can be traced easily and ruined the work of the security services. Tor Browser Bundle had firefox changed by developers - because they say it was not hacked - to facilitate Operation Onymous in 2014. Scripts were all set to run, but the program was like that from default instead of how it was previously with everything set to OFF. That was pressure being put on the team by Security Services and they rolled over. Then they allowed all scripts to be run no matter if the setting was on or off. Again, to keep police and security services happy because they were running exploits on Tor Users. You really can't trust anyone.
    4
  4. 4
  5. 4
  6. 4
  7. 2
  8. 2
  9. 2
  10. 2
  11. 2
  12. 2
  13. 2
  14. 1
  15. 1
  16. 1
  17. 1
  18. 1
  19. 1
  20. 1