Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Looking for VPN recommendations

Looking for VPN recommendations

Scheduled Pinned Locked Moved The Lounge
questioncsharparchitecturehelp
57 Posts 20 Posters 2 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S Shuqian Ying

    Unfortunately, sometimes your browser will just ignore that you have a VPN set up and will send the DNS request straight to your ISP. That’s called a DNS leak. This can lead to you think that you’ve stayed anonymous and that you’re safe from online surveillance, but you won’t be protected. How DNS Leaks Can Destroy Anonymity When Using a VPN, And How to Stop Them[^]. Therefore it's not 100% after all ... I mean works at level 3, level 2 knows no IPs so it does not know how to route base on IP addresses

    Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

    M Offline
    M Offline
    Mike Marynowski
    wrote on last edited by
    #48

    The way you were describing it before you were implying that it is intended that VPNs work that way and all of them work that way, that you *WILL* get leaky protection from a VPN. That's not the case. If that's happening, its a bug or a bad configuration. As the article you linked to states, most of the top VPN providers provide leak detection/prevention already, so a good VPN is a perfectly reasonable way to fully protect yourself.

    Blog: [Code Index] By Mike Marynowski | Business: Singulink

    S 1 Reply Last reply
    0
    • S Shuqian Ying

      Unfortunately, sometimes your browser will just ignore that you have a VPN set up and will send the DNS request straight to your ISP. That’s called a DNS leak. This can lead to you think that you’ve stayed anonymous and that you’re safe from online surveillance, but you won’t be protected. How DNS Leaks Can Destroy Anonymity When Using a VPN, And How to Stop Them[^]. Therefore it's not 100% after all ... I mean works at level 3, level 2 knows no IPs so it does not know how to route base on IP addresses

      Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

      M Offline
      M Offline
      Mike Marynowski
      wrote on last edited by
      #49

      "VPN only offer a leaky protection since it works at IP level" That's the part I'm referring to which was misleading. A properly configured VPN or one that checks for leaky DNS will keep you protected. As per your article: So which VPNs include DNS leak protection? According to BestVPNz.com, Private Internet Access, TorGuard (both of which made it to our best VPNs list), VPNArea, PureVPN, ExpressVPN, VPN.AC, and LiquidVPN all provide protection.

      Blog: [Code Index] By Mike Marynowski | Business: Singulink

      S 1 Reply Last reply
      0
      • S Stefan_Lang

        Thank you very much for the link. I always like a (somewhat?) neutral source to compare products.

        GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)

        K Offline
        K Offline
        Kyle Moyer
        wrote on last edited by
        #50

        My only experience is with PIA (Private Internet Access) as well. It does well enough for what I need. Speeds were not that great in the beginning (2 maybe 3 years ago) but are now up to par. I notice only a marginal drop in bandwidth while connected, which is to be expected due to VPN overhead. They also have a large number of regions you can connect to for circumventing geo-tracking/fencing, et cetera, as well as offering port forwarding on a handful of those if that's something you need. They also include a few concurrent connections without using their client, so you can connect a mobile device as well without needing additional software (this has come in handy while traveling abroad; never know who is recording what off of those hotel wifi points...) For me, the price is more than reasonable for what I'm getting ($25 USD a year, iirc.) Your mileage may vary (obviously) based on your needs.

        1 Reply Last reply
        0
        • M Mike Marynowski

          "VPN only offer a leaky protection since it works at IP level" That's the part I'm referring to which was misleading. A properly configured VPN or one that checks for leaky DNS will keep you protected. As per your article: So which VPNs include DNS leak protection? According to BestVPNz.com, Private Internet Access, TorGuard (both of which made it to our best VPNs list), VPNArea, PureVPN, ExpressVPN, VPN.AC, and LiquidVPN all provide protection.

          Blog: [Code Index] By Mike Marynowski | Business: Singulink

          S Offline
          S Offline
          Shuqian Ying
          wrote on last edited by
          #51

          Users need external means to patch the holes and it's not 100% sure, aren't they? That's what I meant ...

          Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

          1 Reply Last reply
          0
          • M Mike Marynowski

            The way you were describing it before you were implying that it is intended that VPNs work that way and all of them work that way, that you *WILL* get leaky protection from a VPN. That's not the case. If that's happening, its a bug or a bad configuration. As the article you linked to states, most of the top VPN providers provide leak detection/prevention already, so a good VPN is a perfectly reasonable way to fully protect yourself.

            Blog: [Code Index] By Mike Marynowski | Business: Singulink

            S Offline
            S Offline
            Shuqian Ying
            wrote on last edited by
            #52

            Well, in the world of security, info breach/leak "Could" happen == "risk" :) And there are application scenarios that would favor different VPN connections for different application contexts at the same time, like connecting to different remote offices and browsing at the same time. One needs "Split tunneling" ... This is happening in our ever connecting and distributed online experiences

            Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

            1 Reply Last reply
            0
            • S Stefan_Lang

              Ah, you're thinking of browsing. I'm more concerned about stuff like Microsofts CompatTelRunner that does scan your entire hard disks even if you don't participate in CEIP. MS states that (1) it should only be running if you participate, which is a blatant lie, (2) that you can uninstall and hide the related KB update(s), which doesn't help since they wrapped up all KB updates in the cumulative updates, and hidden updates will keep getting unhidden on a regular basis, (3) that it doesn't report any data that I should be concerned about, which I don't believe because of (1) and (2). Any confidential data stored on my disks, including e.g. stuff related to my work, is effectively compromised by MS, no less.

              GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)

              C Offline
              C Offline
              Charles Programmer
              wrote on last edited by
              #53

              I always thought "what faster way to 'innovate' than to steal the ideas of programmers everywhere?" Better yet, their working code.

              1 Reply Last reply
              0
              • S Stefan_Lang

                I'm so fed up with more and more applications (including Windows itself) requiring internet connections and sending out tons of data with little or no control about what is sent and what it is used for. Also, more and more web sites liberally use geolocation data to artificially restrict what I can use, and how. While in some cases, there may be a legal foundation for this behaviour, I doubt that is true most of the time. It doesn't seem like anyone even cares to point that out - which to me is just another red flag, and I am well within my rights to deny that information. Anyway, I was wondering about ways to at least confound all these user data abusing techniques. There are only two things that came to my mind: using TOR, and using a VPN. I'm not sure how much either will help, but I understand that for VPN I need to choose a provider. Different providers provide different services, for a price - or, sometimes, free. And I have no idea what to look out for. So, my question to the community is, do you have recommendations for a first-time VPN user who just wants to retain a lttle more control over his personal data, even if obtained only through obscurity? I don't mind if down/upload speeds go down a bit. Also - this might be a stupid question, but I simply don't know - would it affect my choice of VPN if I were to use TOR, or does it even make sense to use TOR over a VPN? P.S. (2017-4-10): best info found so far: That One Privacy Site | VPN Section[^]

                GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)

                C Offline
                C Offline
                Charles Programmer
                wrote on last edited by
                #54

                I'm running OpenDNS's Simple DNSCrypt to keep my ISP from snooping the packets of my DNS requests, which is still possible if you only use someone else's DNS servers (Google's, OpenDNS's, etc.) I recently became aware of and am considering FreedomBox which you can run on a RasPi among other hardware. Many features/services to choose from, VPN amongst them. Check out their FAQ page. Using the ad blocker has to make up for at least some of the lost speed, with some pages more than make up for. I used to run the UTM, Untangle, but changed the box I was running it on to be a small domain controller. A RasPi would be a much more energy efficient appliance these days.

                1 Reply Last reply
                0
                • S Stefan_Lang

                  I'm so fed up with more and more applications (including Windows itself) requiring internet connections and sending out tons of data with little or no control about what is sent and what it is used for. Also, more and more web sites liberally use geolocation data to artificially restrict what I can use, and how. While in some cases, there may be a legal foundation for this behaviour, I doubt that is true most of the time. It doesn't seem like anyone even cares to point that out - which to me is just another red flag, and I am well within my rights to deny that information. Anyway, I was wondering about ways to at least confound all these user data abusing techniques. There are only two things that came to my mind: using TOR, and using a VPN. I'm not sure how much either will help, but I understand that for VPN I need to choose a provider. Different providers provide different services, for a price - or, sometimes, free. And I have no idea what to look out for. So, my question to the community is, do you have recommendations for a first-time VPN user who just wants to retain a lttle more control over his personal data, even if obtained only through obscurity? I don't mind if down/upload speeds go down a bit. Also - this might be a stupid question, but I simply don't know - would it affect my choice of VPN if I were to use TOR, or does it even make sense to use TOR over a VPN? P.S. (2017-4-10): best info found so far: That One Privacy Site | VPN Section[^]

                  GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)

                  P Offline
                  P Offline
                  pmauriks
                  wrote on last edited by
                  #55

                  I found this Article very interesting: Post-FCC Privacy Rules, Should You VPN? — Krebs on Security[^] and in particular - this site, which was linked to from within: That One Privacy Site | Simple VPN Comparison Chart[^] Hope that helps.

                  1 Reply Last reply
                  0
                  • S Stefan_Lang

                    I'm so fed up with more and more applications (including Windows itself) requiring internet connections and sending out tons of data with little or no control about what is sent and what it is used for. Also, more and more web sites liberally use geolocation data to artificially restrict what I can use, and how. While in some cases, there may be a legal foundation for this behaviour, I doubt that is true most of the time. It doesn't seem like anyone even cares to point that out - which to me is just another red flag, and I am well within my rights to deny that information. Anyway, I was wondering about ways to at least confound all these user data abusing techniques. There are only two things that came to my mind: using TOR, and using a VPN. I'm not sure how much either will help, but I understand that for VPN I need to choose a provider. Different providers provide different services, for a price - or, sometimes, free. And I have no idea what to look out for. So, my question to the community is, do you have recommendations for a first-time VPN user who just wants to retain a lttle more control over his personal data, even if obtained only through obscurity? I don't mind if down/upload speeds go down a bit. Also - this might be a stupid question, but I simply don't know - would it affect my choice of VPN if I were to use TOR, or does it even make sense to use TOR over a VPN? P.S. (2017-4-10): best info found so far: That One Privacy Site | VPN Section[^]

                    GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)

                    I Offline
                    I Offline
                    Idaho Edokpayi
                    wrote on last edited by
                    #56

                    Buy VPN and the NSA will put you on a LIST!!!!

                    Idaho Edokpayi

                    S 1 Reply Last reply
                    0
                    • I Idaho Edokpayi

                      Buy VPN and the NSA will put you on a LIST!!!!

                      Idaho Edokpayi

                      S Offline
                      S Offline
                      Stefan_Lang
                      wrote on last edited by
                      #57

                      Unfortunately I'm already on it just for asking about it - as is everyone else answering in this thread :omg: ;P

                      GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups