There's no such thing as a no logs VPN

So this happened. The OP claims this is evidence that there's no such thing as a no- log VPN. I was wondering if someone smarter than me which is probably everyone here would care to give an opinion, and I'll keep my ignorant opions to myself and thank you in advance. Things get interesting around pg.22 of the .pdf.

justice.gov/opa/press-release/file/1001841/download

Attached: 22.JPG (893x471, 65.56K)

Other urls found in this thread:

torproject.org
theguardian.com/technology/2013/may/16/lulzsec-hacking-fbi-jail
cryptostorm.is/
purevpn.com/privacy-policy.php
twitter.com/NSFWRedditVideo

...

piracy*

Attached: 100617lincc5.jpg (1021x800, 173K)

...

OP here. I understand that there are a lot of other factors involved.Bad Opsec on the "perps" fault. But I couldn't distinguish if they could only determine that he was using a VPN, ..vs they could prove what he was doing while logged into the VPN. Let me add my interest are purely educational I only use my VPN for stealing movies and Netflix.

Attached: 15447082821892.mp4 (198x360, 4.31M)

Nigga, just use Tor bridges! ;v

C'mon that's an obvious trap.

this. what you need to look for in a VPN is:
1. where it's based.
2. what payment methods it accepts
3. what info they require to use it

I recommend mullvad personally. They don't require an "account" you can pay with crypto. and they are located in Sweden.

DO NOT USE VPN
they are jewish honeypots. the only point of VPN existence is to provide shekels to VPN owner. they will cooperate with all authorities because they only care about their profits

USE TOR
superior to VPN in all aspects. works by design
it's not perfect but you can have additional defenses

DO NOT PAY FOR VPN, instead donate 5-10$ a month to Tor nodes, or host your own ones

fuck off mullvad employee

it doesn't matter you pay with crypto because when you connect to VPN you send your real IP. IP can be used to identify you and your home address. even using remote public WIFI would be more anonymous than using VPN

only this is acceptable:
VPN ==> Tor
Tor ==> VPN (risky)
but you need to understand this scenarios and what risks they have


DO NOT BUY VPN, it's snakeoil. use Tor which costs 0$ but is superior

when you use VPN, you get same IP for every website that you visit. so if you log into your real account, then post on 8ch, it can be easily connected
when you use Tor and Tor Browser, you get different IP for every website that you visit and even different IP for same website when you visit it another day

also, if you use standard web browser with VPN, you will be fingerprinted, jews and Google will know it's you
use Tor and Tor Browser which has anti fingerprinting measures

get them from here:
torproject.org

Hello 12 year old.

Attached: Lulzsec_hackers_arrested.png (456x512, 411.37K)

I see lot of anti-vpn shills here, can one of you give an actual argument instead of following non-arguments:
Basically my argument is that it is in their best interests to provide you the service they say they do because that makes them most money and there are only laws that force them to cooperate with law enforcement but not keep logs (choose VPN from such country), and as there aren't logs there is nothing to hand over.

I'm looking for arguments about things such as, timing correlation, packet stream correlation etc.

Oh and just for the record I'm not concerned about anything that requires specific targeting by law enforcement, so those scenarios are out, only care about foreign mass surveillance and spying by websites I visit.

>Then on 7 June 2011, Monsegur, who usually took care to disguise his location by using the Tor system – which anonymises data connections – forgot to use it when logging into an Anonymous chat forum
theguardian.com/technology/2013/may/16/lulzsec-hacking-fbi-jail


I recommend Mullvad as well, because they accept Bitcoin, Multi-hop VPN, Wireguard and do not require registration. It's the best I could find.

absolute niggers, setup your own VPNs at home

you're a brainlet.

Why would you be logging into your account from the dirty VPN IP anyway? are you retarded? That's opsec fail number one.

public wifi ==> VPN obviously.

LOL

forgot to use it?
How is that possible?
The dude was probably using it everyday for months or years at that point. Wouldn't that have become second nature then?

This whole discussion is stupid. VPNs and tor are different tools for different threat models.

Use a VPN if you think your ISP (or your local network) is tracking you or throttling you, if you want to torrent stuff, or if you just want to appear to be from another jurisdiction.

Use tor to genuinely thwart most tracking if you're concerned about that, or to do things that are illegal almost everywhere. Good luck with CAPTCHAs and blanket tor bans though.

Hmmm.

you're retarded

...

thank you for that advice, satan

no.
in their best interests is to make as much profit as possible. if government tells them to give data or they will close their company or fine it or send some gov agencies, VPN company will give the data to them
and selling users doesn't result in them losing much customers. HideMyAss openly sold users and it's still in business.

facebook sells user data for years to everyone. can you show me which facebook executives got jailed and how much fines did facebook pay?


fuck you CIA


because website might block Tor IP's
so you need to use VPN or proxies after Tor to access it


no, they are very similar, both are used for privacy purposes

Tor can be used for same purpose

captchas where? they are mostly on jewish cuckflare websites, I rarely visit them anyway

can be avoided with proxy or VPN added after Tor

-when you use VPN, you connect to VPN IP (example: 1.2.3.4), then when you connect to website, that website gets 1.2.3.4 IP. police can just check who connected to 1.2.3.4 IP on that day, it will be you and some other people. then they can use your country or useragent to identify one person (you) that connected to the website with that VPN.
if you use Tor, you connect to Tor entry node, but your exit IP that connects to website is different that Tor entry node IP
-when you use VPN and open 30 different websites, you get same IP for all of them. so your actions and accounts can be easily linked. if you log into real account with that VPN you are fully identified on all websites that you visited.
if you use Tor, you get different IP for every website you visit
-when you use VPN with normal web browser, you can be fully fingerprinted with useragent and other things
if you use Tor Browser, you are protected against fingerprinting
-when you use VPN and get disconnected from it, your OS could just send everything in clearnet, without notyfing you
if you use Tor, when your Tor connection is disconnected, it simply stops working, it won't leak anything in clearnet

VPN = capitalism = sells you to jews for profit = evil
Tor = communism = protects you for ideals = good


capitalism = CIA, jews, corporations, SJW, slavery, feudalism
need to destroy it

(((Tor)))
Enough exit nodes are pozzed to correlate you. but it's still better than "we only told you no logs so you would buy our service goy" VPNs

How would they know what country a user is from? Browser timezone settings? Besides knowing the useragent and country aren't enough to pin point one specific person, of course it might be possible with hardcore javascript fingerprinting and trackers
Keep a separate browser (chromium) that doesn't connect to your VPN for anything linked to your real identity
-when you use VPN with normal web browser, you can be fully fingerprinted with useragent and other things
if you use Tor Browser, you are protected against fingerprinting
Harden your browser my dude
-when you use VPN and get disconnected from it, your OS could just send everything in clearnet, without notyfing you
if you use Tor, when your Tor connection is disconnected, it simply stops working, it won't leak anything in clearnet
Setup your firewall to block all non-VPN traffic for everything except the personal-use browser mentioned above

You gotta have good opsec no matter your proxy of choice, i like to use use a mix of everything, I.E Tor for IRC, 8ch, news and tor-only email, porn, VPN for piracy, steam, browsing, chromium for banking, work and the few times a year I have to use google services

Fucked up my greentext, good job user you fucking retard

Double-bag your VPN. VPN-1 only shows you connecting to VPN-2. VPN-2 just has a log of someone coming from VPN-1. Problem solved.

i2p is the white man's choice.

This

If only there were a place online where the mods were honest and would admit when they get butthurt.

What's being said here?

if you want to escape your isp/country restrictions, it's alright. but for anything else, it's absolute state of retardation.

Attached: healthy-anon.png (634x476, 179.97K)

cryptostorm.is/ here you go pals

Zig Forums logs your IPs.

Why do you need a non-logging VPN? What are you so afraid of?

purevpn.com/privacy-policy.php

Though any VPN companies don't make logs, their ISPs or IDCs can make logs. VPN companies also need Internet service providers and data centers.

China has incredibly lax fraud laws, so unless you have a lot of power dragging scammers to court is expensive and only results in them getting a slap on the wrist.