• liveinthisworld@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 months ago

        As he said, paid with crypto and managed with his own keys. I don’t see how the seedbox provider can trace you if you do that, so there’s not that much to worry about

        • myersguy@lemmy.simpl.website
          link
          fedilink
          English
          arrow-up
          2
          ·
          3 months ago

          You’re going to connect to the seedbox at some point, which ties your IP to the traffic. If you are worried about a VPN attaching your IP to traffic, this is no different, no?

          • liveinthisworld@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            edit-2
            3 months ago

            SFTP over TOR. This should be a requirement at this point.

            If you’re not doing that, then yes you’re technically right in that seedbox companies can be subpoenaed too. I usually use TOR to copy over what little I torrent.

        • sus@programming.dev
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 months ago

          if you can’t connect to a vpn using only open source software, that’s a crappy vpn

    • Telorand@reddthat.com
      link
      fedilink
      English
      arrow-up
      5
      ·
      3 months ago

      What evidence do you have that no-log VPNs are compromised by the NSA? What about VPNs based in other countries like Canada?

      • KillingTimeItself@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        3 months ago

        the US has so much geopolitical reach that companies in canada or elsewhere would just hand over the question if it was high enough profile.

        • Telorand@reddthat.com
          link
          fedilink
          English
          arrow-up
          4
          ·
          3 months ago

          That’s an interesting point, but I think the “if it’s high profile enough” is key. People torrenting files is probably low on their priorities. On the other hand, somebody organizing a terrorist cell is probably much higher.

          Companies might have an interest in finding pirates, but it would not be as easy for them to get other companies to comply with their subpoenas.

          • KillingTimeItself@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            4
            ·
            3 months ago

            yeah if ur just a dude pirating, it probably doesn’t matter, but if they find you’ve done a large crime, you can bet your ass that shits getting yoinked from you.

            companies might, but that’s almost entirely through legal processes. ceast and desists, required reporting, etc…

        • Telorand@reddthat.com
          link
          fedilink
          English
          arrow-up
          13
          ·
          3 months ago

          The existence of the NSA and their activities is not proof that they have backdoors in VPNs. That’s bogeyman conspiracy theory shit—“they could be anywhere, therefore they’re everywhere!”

          You still haven’t answered the question, and I’m beginning to think you are making shit up based on paranoia.

            • Syntha@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              7
              ·
              3 months ago

              Is there literally any evidence that the US government managed to extract useful information from no-log vpn providers in the US?

              • SaltySalamander@fedia.io
                link
                fedilink
                arrow-up
                1
                ·
                3 months ago

                I have (anecdotal) evidence that they, in fact, can’t extract useful information from one particular no-log vpn provider in the US, PIA. They showed up to seize data, but walked away empty-handed when they found out that they are, truly, no-log and their servers run entirely from RAM, so no drives to extract data from.

        • psud@aussie.zone
          link
          fedilink
          English
          arrow-up
          2
          ·
          3 months ago

          Is your home machine, your phone, better protected than the VPN servers? I bet you’re not as good at IT security as the IT security staff VPN companies hire

          If your threat model includes nation state actors, you’re best off not using networked computers