What I want a pirated sports stream with sponsorblock
What I want a pirated sports stream with sponsorblock
Why are they “afraid”?
It’s not about the website. Unless they have blocked access to the “connection” endpoint that Mullvad operates, you should still be able to connect to it.
Use TOR bridges. I don’t know how good their firewall is; can they deal with Obsf4/Snowflake too? If they can, I’ll admit that they are taking this seriously.
Use OpenVPN with Mullvad/IVPN if you can, OpenVPN can be disguised as HTTPS traffic. I wouldn’t rely on a free VPN because of the data mining, and it’s only a matter of time before Proton gets banned too
Does the UAE have something similar to China?
Unless they’re doing some serious DPI (no idea how they would do that on Wireguard traffic other than plain metadata mining), the only ways they can stop traffic is by stopping anything to certain IP spaces, or certain types of traffic through certain ports, or a combination of both. If they have truly blocked the Mullvad IP space, then no this will not work, but OP mentioned using a different app to access them, which lets me assume that it was a problem with the client.
Just install wireguard on your OS and get the files from the Mullvad site. Also, pay in XMR
True, DoH and this will be useless
Have they heard of VPNs or no?
Nobody is hacking your computer LMAO. It just lets them establish a connection to your computer to leech the file(s), nothing more
Nice try RIAA. My favourite isn’t in the Mega thread HAHAHA HAHAHAHA losers
What you’re talking about is supposed anonymity in obfuscation, and that has been proven to not work.
Also, most VPN companies keep logs and can be subpoenaed. Not all, but most. I2P is meant to anonymize your traffic, so I do not see the point of your statement
I can understand the argument against bandwidth, but how do you conclude that it is not anonymous enough? Even against a VPN?
Maybe I should have said “it’s not anonymous based on your threat model”
Technically speaking, VPN logs tend to include the IP address of clients connecting to them, after which the good VPN providers like Mullvad, IVPN and maybe PIA tend to purge them somewhere in their process. Now, if the VPN is running in a RAM-only node, then these logs probably don’t touch storage, which means there’s not much need to shred information from hard drives for the VPN provider.
With that said, an ISP can technically log your traffic and see that you’re connecting to the IP range associated with a VPN. That and perhaps some more covert side-channel/correlation attacks can, in theory, compromise your identity.
Of course, this is going deep into OPSEC and forensics, and I don’t think the NSA is that interested in the average Billy torrenting “The Office” to go through that many logs, even if the studios sue in court. Hence, technically your privacy is somewhat maintained with the good VPN providers, but you’re definitely not anonymous
For anonymity, yes. Sure you might fool Google trying to match your IP to your traffic but that’s about it
SFTP over TOR. This should be a requirement at this point.
If you’re not doing that, then yes you’re technically right in that seedbox companies can be subpoenaed too. I usually use TOR to copy over what little I torrent.
And because some random report from a third-party who is just as interested in profit said something that matches the worldview of the general masses is out, you’re going to believe them?
I don’t care what “tech” it is, they are incentivized to lie and you know it. I am still baffled at how absolutely anyone takes the word of corporations to heart
How do you think your friend in the woods got the advertisements?
And yes, I still think you’re too trusting of Big Tech. They are 100 times more vile than you think they are. THEY WILL do everything they can, and this is nothing to them.
The funny part is nobody wants to believe me and instead want to trust for-profit companies for their supposed pinkie-promises. Oh well, they’ll learn in time.
I do not see why everyone wants to deny this and trust big tech. After you lot completely brainwashed?? Assume the worst, that malicious applications are recording both your microphone and your camera, and do the best you can. Anyone even taking Meta’s/Google’s side here is absurd to me.
That shouldn’t be possible in theory unless I don’t know it well enough. Care to provide a screenshot?
In religion, people are:
How exactly is YouTube doing that?