Hacker News new | past | comments | ask | show | jobs | submit login

>> shared public IP for dozens of users make them harder to track and their network traffic is mixed

> In that case, tunnel your VPN inside of a public VPN.

That doesn't solve anything:

#1. Public VPN -> Private VPN -> Internet <- Here you no longer have a shared IP with other users, so no more mixed traffic. Websites will see the IP of your private server/vps.

#2. Private VPN -> Public VPN -> Internet <- Here your Public VPN provider can still see your web traffic




> That doesn't solve anything:

It solves the (lack of) trust on the Public virtual Private whatever provider.

> #1. Public VPN -> Private VPN -> Internet <- Here you no longer have a shared IP with other users, so no more mixed traffic. Websites will see the IP of your private server/vps.

For mix your IP with others (are the VPN users visiting the same sites?), I said there are open proxies since the beginnings of internet.

It's not the purpose of an VPN.

> #2. Private VPN -> Public VPN -> Internet <- Here your Public VPN provider can still see your web traffic

They will always, in ANY case and scenario that involves them.

But in this case, at least, now you're sure that your channel uses your encryption and policies.

With a third party channel, you're never sure if the guy near you in starbucks with a headphone, also has the signing key of your "private thing".




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: