As he said, paid with crypto and managed with his own keys. I don’t see how the seedbox provider can trace you if you do that, so there’s not that much to worry about
You’re going to connect to the seedbox at some point, which ties your IP to the traffic. If you are worried about a VPN attaching your IP to traffic, this is no different, no?
SFTP over TOR. This should be a requirement at this point.
If you’re not doing that, then yes you’re technically right in that seedbox companies can be subpoenaed too. I usually use TOR to copy over what little I torrent.
That’s an interesting point, but I think the “if it’s high profile enough” is key. People torrenting files is probably low on their priorities. On the other hand, somebody organizing a terrorist cell is probably much higher.
Companies might have an interest in finding pirates, but it would not be as easy for them to get other companies to comply with their subpoenas.
yeah if ur just a dude pirating, it probably doesn’t matter, but if they find you’ve done a large crime, you can bet your ass that shits getting yoinked from you.
companies might, but that’s almost entirely through legal processes. ceast and desists, required reporting, etc…
The existence of the NSA and their activities is not proof that they have backdoors in VPNs. That’s bogeyman conspiracy theory shit—“they could be anywhere, therefore they’re everywhere!”
You still haven’t answered the question, and I’m beginning to think you are making shit up based on paranoia.
I have (anecdotal) evidence that they, in fact, can’t extract useful information from one particular no-log vpn provider in the US, PIA. They showed up to seize data, but walked away empty-handed when they found out that they are, truly, no-log and their servers run entirely from RAM, so no drives to extract data from.
Is your home machine, your phone, better protected than the VPN servers? I bet you’re not as good at IT security as the IT security staff VPN companies hire
If your threat model includes nation state actors, you’re best off not using networked computers
deleted by creator
If you are worried about VPN’s, why are you not worried about seedbox providers?
As he said, paid with crypto and managed with his own keys. I don’t see how the seedbox provider can trace you if you do that, so there’s not that much to worry about
You’re going to connect to the seedbox at some point, which ties your IP to the traffic. If you are worried about a VPN attaching your IP to traffic, this is no different, no?
SFTP over TOR. This should be a requirement at this point.
If you’re not doing that, then yes you’re technically right in that seedbox companies can be subpoenaed too. I usually use TOR to copy over what little I torrent.
deleted by creator
if you can’t connect to a vpn using only open source software, that’s a crappy vpn
What evidence do you have that no-log VPNs are compromised by the NSA? What about VPNs based in other countries like Canada?
the US has so much geopolitical reach that companies in canada or elsewhere would just hand over the question if it was high enough profile.
That’s an interesting point, but I think the “if it’s high profile enough” is key. People torrenting files is probably low on their priorities. On the other hand, somebody organizing a terrorist cell is probably much higher.
Companies might have an interest in finding pirates, but it would not be as easy for them to get other companies to comply with their subpoenas.
yeah if ur just a dude pirating, it probably doesn’t matter, but if they find you’ve done a large crime, you can bet your ass that shits getting yoinked from you.
companies might, but that’s almost entirely through legal processes. ceast and desists, required reporting, etc…
deleted by creator
The existence of the NSA and their activities is not proof that they have backdoors in VPNs. That’s bogeyman conspiracy theory shit—“they could be anywhere, therefore they’re everywhere!”
You still haven’t answered the question, and I’m beginning to think you are making shit up based on paranoia.
deleted by creator
Is there literally any evidence that the US government managed to extract useful information from no-log vpn providers in the US?
I have (anecdotal) evidence that they, in fact, can’t extract useful information from one particular no-log vpn provider in the US, PIA. They showed up to seize data, but walked away empty-handed when they found out that they are, truly, no-log and their servers run entirely from RAM, so no drives to extract data from.
You didn’t answer the question. Your behavior is toxic.
deleted by creator
Is your home machine, your phone, better protected than the VPN servers? I bet you’re not as good at IT security as the IT security staff VPN companies hire
If your threat model includes nation state actors, you’re best off not using networked computers
Removed by mod