(Feb 19, 2018, 13:39 pm)wdc Wrote: [ -> ]I do not trust paid/free VPN services, if i want to order it, i may look at this list: https://www.privacytools.io/#vpn
I use my own VPN server - https://internetlifeforum.com/security/4...id-client/
(Make sure you order the Linux VPS via Tor browser and using anonymized bitcoin (coinjoin service)), google it.
I am no expert, but from what I have been able to gather the safest procedures for downloading anything of especially 'questionable' material are:
1. Use a VPN based outside of the Empire. Hong Kong, Singapore, Belarus, Uganda... Make sure the VPN site GUARANTEES that NO LOGS are kept. This is critical. But bear in mind that they may lie.
2. You may need to check with the VPN provider as to what ports are open by default. This may affect PTP traffic
(Two machines without Port Forwarding cannot communicate!)
3. Use TorBrowser. Do not use TOR for the full connection as downloading large files is not considered good manners for the limited bandwidth available, and would slow things down considerably. With TOR browser, copy the link location and paste into the torrent client. (You can associate it with links, but it is not considered a great idea).
4. Disable IPV6. I *believe* it can ignore a TUN/TAP (VPN) connection and expose your machine. (Someone please correct if this is wrong).
The Deep State is not all that interested in folks who share software, so they are not likely to target you for downloading blockbusters or porn. However if you do become a 'Person of Interest' (almost*) nothing you can do will protect you, especially if you have a newer iXX series Intel processor. They can PWN you at will. Another favorite trick is Man-In-The-Middle 'updates' of popular software.
* Possible 'prophylaxis' ...
a. Use older machines such as C2D and probably earlier C2Qs. (2006 and before).
b. There is some question as to whether AMD chips have been compromised.
c. Use Chinese open hardware/software Linux systems.
d. Use XP for Win. Most of the new spybots/encryptors use newer .NET libraries and die on XP.
e. Use a *real* firewall - something that REPLACES, and does not 'augment' the Win firewall (with programmable backdoors).
- These steps are useful only for those who have the *need* - occasional, or frequent - to be paranoid.