Skip to content

Instantly share code, notes, and snippets.

@joepie91
Last active December 19, 2024 02:57
Show Gist options
  • Save joepie91/5a9909939e6ce7d09e29 to your computer and use it in GitHub Desktop.
Save joepie91/5a9909939e6ce7d09e29 to your computer and use it in GitHub Desktop.
Don't use VPN services.

Don't use VPN services.

No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.

Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.

  • A Russian translation of this article can be found here, contributed by Timur Demin.
  • A Turkish translation can be found here, contributed by agyild.
  • There's also this article about VPN services, which is honestly better written (and has more cat pictures!) than my article.

Why not?

Because a VPN in this sense is just a glorified proxy. The VPN provider can see all your traffic, and do with it what they want - including logging.

But my provider doesn't log!

There is no way for you to verify that, and of course this is what a malicious VPN provider would claim as well. In short: the only safe assumption is that every VPN provider logs.

And remember that it is in a VPN provider's best interest to log their users - it lets them deflect blame to the customer, if they ever were to get into legal trouble. The $10/month that you're paying for your VPN service doesn't even pay for the lawyer's coffee, so expect them to hand you over.

But a provider would lose business if they did that!

I'll believe that when HideMyAss goes out of business. They gave up their users years ago, and this was widely publicized. The reality is that most of their customers will either not care or not even be aware of it.

But I pay anonymously, using Bitcoin/PaysafeCard/Cash/drugs!

Doesn't matter. You're still connecting to their service from your own IP, and they can log that.

But I want more security!

VPNs don't provide security. They are just a glorified proxy.

But I want more privacy!

VPNs don't provide privacy, with a few exceptions (detailed below). They are just a proxy. If somebody wants to tap your connection, they can still do so - they just have to do so at a different point (ie. when your traffic leaves the VPN server).

But I want more encryption!

Use SSL/TLS and HTTPS (for centralized services), or end-to-end encryption (for social or P2P applications). VPNs can't magically encrypt your traffic - it's simply not technically possible. If the endpoint expects plaintext, there is nothing you can do about that.

When using a VPN, the only encrypted part of the connection is from you to the VPN provider. From the VPN provider onwards, it is the same as it would have been without a VPN. And remember, the VPN provider can see and mess with all your traffic.

But I want to confuse trackers by sharing an IP address!

Your IP address is a largely irrelevant metric in modern tracking systems. Marketers have gotten wise to these kind of tactics, and combined with increased adoption of CGNAT and an ever-increasing amount of devices per household, it just isn't a reliable data point anymore.

Marketers will almost always use some kind of other metric to identify and distinguish you. That can be anything from a useragent to a fingerprinting profile. A VPN cannot prevent this.

So when should I use a VPN?

There are roughly two usecases where you might want to use a VPN:

  1. You are on a known-hostile network (eg. a public airport WiFi access point, or an ISP that is known to use MITM), and you want to work around that.
  2. You want to hide your IP from a very specific set of non-government-sanctioned adversaries - for example, circumventing a ban in a chatroom or preventing anti-piracy scareletters.

In the second case, you'd probably just want a regular proxy specifically for that traffic - sending all of your traffic over a VPN provider (like is the default with almost every VPN client) will still result in the provider being able to snoop on and mess with your traffic.

However, in practice, just don't use a VPN provider at all, even for these cases.

So, then... what?

If you absolutely need a VPN, and you understand what its limitations are, purchase a VPS and set up your own (either using something like Streisand or manually - I recommend using Wireguard). I will not recommend any specific providers (diversity is good!), but there are plenty of cheap ones to be found on LowEndTalk.

But how is that any better than a VPN service?

A VPN provider specifically seeks out those who are looking for privacy, and who may thus have interesting traffic. Statistically speaking, it is more likely that a VPN provider will be malicious or a honeypot, than that an arbitrary generic VPS provider will be.

So why do VPN services exist? Surely they must serve some purpose?

Because it's easy money. You just set up OpenVPN on a few servers, and essentially start reselling bandwidth with a markup. You can make every promise in the world, because nobody can verify them. You don't even have to know what you're doing, because again, nobody can verify what you say. It is 100% snake-oil.

So yes, VPN services do serve a purpose - it's just one that benefits the provider, not you.


This post is licensed under the WTFPL or CC0, at your choice. You may distribute, use, modify, translate, and license it in any way.


Before you comment: Be aware that any non-constructive comments will be removed. This includes advertising for VPN providers (yes, even when you phrase the marketing claims like a question), trolling, harassment, insults towards other people, claims that have already been addressed in the article, and so on.

If your comment isn't a genuine question or a concrete counterargument supported by evidence, it probably doesn't belong here.

@gabsoftware
Copy link

Another valid use case is to circumvent ISP applying QOS on specific ports or services. When something works better using a VPN, that's because your ISP was throttling your bandwidth. This is my main use of a VPN.

@jonas9105
Copy link

The post is fine but the headline is wrong. Especially since you clearly state valid use-cases for a VPN. So, yes, there are reasons to use a VPN. (Another use-case, probably covered in 2) is access to country-restricted services like netflix, bbc, etc). You just should never rely on a VPN to guarantee your anonymity.

That's illegal.

@drbonesaw
Copy link

Protecting you anonymity / privacy is not illegal asshole.

@jonas9105
Copy link

Protecting you anonymity / privacy is not illegal asshole.

You clearly didn't read the comment (or this post).

  1. No. A VPN does not protect your anonymity or your privacy.
  2. Yes, it is illegal to use a VPN service to exploit country restrictions on services like Netflix, Amazon Prime, etc.

Maybe next time, read and think before you comment.

Best,
Asshole

@Firsh
Copy link

Firsh commented Oct 2, 2021

Good writeup! I found the best use of VPN that was to set one up in my home network (Raspberry Pi). It's always on and whenever I'm on my phone and have a chance to use 3rd party Wi-Fi, I just connect to my free at-home VPN that I know is safe. I set this up from an airport in China where their great firewall blocked the sites I wanted, but not my home IP so I could SSH in and set it up :) When I actually needed one in a specific country I fired up a VPS and put OpenVPN on it. Depending on providers, shutting down the VPS and keeping it available on standby may not cost much, so there may not be a need to delete these in case they come in handy in the future. Some services offer regional pricing depending on the country of your IP, or restrict content. Car rentals, flight tickets, purchasing-power adjusted pricing, geolocation detection for VAT purposes, region-locked streaming, you name it. The last thing you want is send money-related traffic through a randomass VPN.

Copy link

ghost commented Oct 3, 2021

Do you combine it with Threema?

@atoponce
Copy link

atoponce commented Oct 3, 2021

Threema is already end-to-end encrypted, so a VPN isn't getting you much. However, it also supports a web interface backdoor.

Copy link

ghost commented Oct 3, 2021

Threema is already end-to-end encrypted, so a VPN isn't getting you much. However, it also supports a web interface backdoor.

Can you explain please 🤔

@atoponce
Copy link

atoponce commented Oct 3, 2021

Explain what?

Copy link

ghost commented Oct 3, 2021

However, it also supports a web interface backdoor. This, ofcourse

@atoponce
Copy link

atoponce commented Oct 3, 2021

Sure. This has been discussed at length by security experts and cryptographers. Here's some reading material:

The TL;DR boils down to this: unless you fully trust the web server and all of the administrators, or unless you are fully inspecting the source code on every page refresh, you cannot guarantee that the web client has not been compromised by malicious JavaScript. And even if you are inspecting the source code on every page refresh, the person you're chatting with might not be.

The solution of course is to not rely on JavaScript cryptography, but instead use local clients, but you can't guarantee that either with your contacts.

If I were a faceless government organization, and I wanted to compromise end-to-end encrypted communications, I would be interested in services with web clients.

@fredster33
Copy link

Thanks. This is really nice.

More info that I've found helpful:

Copy link

ghost commented Oct 3, 2021

Thank you @ atoponce & @ fredster33
Most helpfull.

@atoponce
Copy link

atoponce commented Oct 4, 2021

New article from Joseph Cox at Vice. The general advice to use a VPN service is outdated, and many are just actively dangerous (emphasis mine):

One risk is some VPN providers use self-signed root CAs, which allow the creator to read encrypted traffic coming from a computer. White said this is done in the pursuit of malware prevention, but that "is just a different way of saying 'intercepting your (otherwise) encrypted web and mail traffic.'"

https://www.vice.com/en/article/xgxnwk/you-probably-dont-need-a-vpn

Copy link

ghost commented Nov 15, 2021

In my life, I've never seen someone using VPN to protect their privacy. Afaik, it's mostly used to lift geo-restrictions to access international websites.

@CummingCowGirl
Copy link

In my life, I've never seen someone using VPN to protect their privacy. Afaik, it's mostly used to lift geo-restrictions to access international websites.

You are a flat out liar.

Copy link

ghost commented Nov 15, 2021

In my life, I've never seen someone using VPN to protect their privacy. Afaik, it's mostly used to lift geo-restrictions to access international websites.

You are a flat out liar.

Excuse me? You think it's something I enjoy lying such thing? No one I've came across ever knew that privacy was even a thing.
Also HTTPS itself will encrypt the whole website data, means we're already pretty secure with your daily internet consumption.

@devasia2112
Copy link

devasia2112 commented Nov 18, 2021 via email

@Naleksuh
Copy link

Lol this disaster of a post is now on r/masterhacker https://www.reddit.com/r/masterhacker/comments/pz6hde/dont_use_a_vpn_guys/

@JimboUS
Copy link

JimboUS commented Dec 12, 2021

As I stated above:
"EXACTLY!
It all depends on what your threat model is and who is going to target you.
If your threat is the forum admin mentioned above, then you're 100% safe in posting your ramblings.
BUT remember: Tor, and also VPN, are pretty good as long as you're not a super government agency target.
A super government agency like the NSA/GCHQ/China MSS/etc., will find you in good time and no one will know about it.
The guys in the Suburbans dressed in black will show up at 4am in your place, put a hood over your head and take you away, and no one will know about where you'll be going.
BUT for that to occur you must represent a pretty huge threat to them!
BUT if you are that type of threat you wont be using VPNs or Tor, at least not in any set way, with any set equipment, in any set locations, and far away from any video surveillance cameras."

BUT:
There are a few VPN services, like Proton VPN, located in a privacy protected country, Switzerland, that do not log.
Using such a VPN (or two) to hide your IP identity along with an anonymous/encrypted email service like Proton Mail or tutanota will protect your identity, say in case you wish to stay untraceable if you write a politically incorrect letter to news publication like The Guardian or the New York Times, or the Washington Post, etc., and you do not want some woke editor or IT guy there tracing your IP and then calling their friend at your IP provider and the next thing you know you are identified and you are being fried alive on Twitter or Facebook, etc.

In that case a VPN can live up to its expectations.
Absolutely Avoid any VPN service servers located in any of the 5 eyes or the 9 eyes or the 14 eyes or the xx eyes, or Russia, China, etc.

Again, as I stated previously above, if you are a huge threat given enough time and resources you'll be ID'd, but for run of the mill anonymity a VPN service like that described above is fool proof.

For every day security HTTPS will suffice, as it has been stated by others above, but for anonymity a no-log VPN located in a safe jurisdiction is required.

Now, the problem is that some VPN services may be secretly run by the super government agencies like the NSA/GCHQ/China MSS/etc., and that you'll never know! BUT such VPN operations will be truly valuable assets with extremely strict security operations protocols and will be focused on really huge threats, not your politically incorrect letter to the editor!

@MeerKatDev
Copy link

This guy doesn't live in Europe obviously, where we use VPNs mostly to access Netflix US and Hulu. Really, a useless post.

@Naleksuh
Copy link

Yeah, we are all tired of joepie91's made up garbage. Pretty much all they have ever done is be a pain in the ass online

@eqn-group
This comment was marked as a violation of GitHub Acceptable Use Policies
@LokiFawkes
Copy link

LokiFawkes commented Jan 23, 2022

@hackers-terabit There is actually a distinction in the industry between a proxy and a VPN, and consumer VPN providers are just a glorified proxy.
First, you wrote as if encrypted proxies haven't existed. There are two kinds of consumer VPNs - Encrypted proxies that rebranded using the acronym, and proxies that have always been lying to you.
They may even use VPN protocols, but ultimately, they miss one important distinction. They're not private. They are by definition public. This is a case of "we use ['military'|'enterprise'] grade ['encryption'|'protocols'|other marketing woo] therefore you're getting some kind of advantage."
This is the way Microsoft hypes up its new consumer software or services. "This used to be only for enterprise, now you can have it too! You know, cause you aren't switching to free software which has been able to do the same thing without having to buy a million CALs all these years"
In businesses, military, and at Laevateinn, VPNs are used to tunnel into a private network, either to appear as originating from that location, or to access private resources. That's the P in VPN. If you're not going into a private network, there is no P. Additionally, a lot of "VPN" services aren't even using the right protocols. They're just proxies with an encrypted connection to you. Not only that but if they're sold by an antivirus peddler, you can be certain the VPN client replaces your root cert too, decrypting your TLS traffic for their viewing pleasure.

"configuring a VPN by default eliminates an entire class of security vulnerabilities"
No, no it does not. If you use a VPN to browse the clearnet, that traffic will reach the clearnet. In addition, if you browse to a malicious site, a VPN will provide zero protection unless it's blocking the entire site somehow. But for such a purpose, why not just use a blocker? On that same note, a VPN provider might block something you're trying to access, at which point you now have to exit the VPN. And if you don't have control, there is no P in VPN. Or I guess you could say in that case, the P is for Proxy instead of Private, because you're using it wrong.
Your traffic can easily be de-anonymized, too. A simple javascript, an HTML tag, a login, or a browser fingerprint can compromise the entire tunnel. I've even deanonymized some VPN connections by simply, programmatically, asking the VPN provider. Not only was I able to get the real IP, I got the user's IDENTITY. That's less secure than just going onto the clearnet without one, and I would have had no clue who it was if they had simply dropped the VPN and connected to a coffee shop. (This was part of an experiment, not for malicious purposes. No innocent bystanders were deanonymized)
And there's another thing. Most public Wifi networks today are using a WPA key or a captive network. Sometimes both. Combine that with HTTPS and DoT, nobody knows what the hell you're doing. Especially if they're using WPA3 (with or without a password). Sure, the router will see what IP you're connecting to, but this is that Web2.0 crap where everything is centralized because people for some reason thought that centralizing the Internet to some giant corpos wouldn't bite their ass. So like a million sites can be hosted in one datacenter, meaning you NEED the domain name to determine the real destination.

Consumer VPNs - Not even once. At least, not if you're doing anything more than watching TV shows banned in your country.

@eqn-group
Copy link

The thread was created in 2015, the comment section is still active.

@SilverPaladin
Copy link

SilverPaladin commented Jan 23, 2022 via email

@xdung24
Copy link

xdung24 commented Feb 2, 2022

I never trust any VPN service, I only use VPN of the company to WFH. When using it, I will be very cautious. If you want to do something in private, encryption is the most important. If you only want to change IP to bypass the country blocking, then a proxy is good enough. The whole point here is the a VPN is not proxy + encryption. It is just like a proxy

@madeitjustforthis
Copy link

Does this also apply to browsers like DuckDuckGo? If so what others?

I was always suspect of VPN’s just not being trustworthy. The fact that they can be hacked but also the people running it can go free Willy on pretty much anything you do.

VPN’s are like the FBI and the interrogation room. These MF’s watching you from all angles but nobody know you in there just them 🤣

@LokiFawkes
Copy link

Search engines, like DuckDuckGo, should also be treated like they're vulnerable, but the difference is the attack vector is smaller. A glorified proxy will see everything. At worst, if DuckDuckGo breaks its promise, it'll have a record of search terms. With good enough opsec, that's not too much of a concern, unlike if you were using a massive data collector like Google.

@LokiFawkes
Copy link

@isaackielma Sounds like a proxy server list hosted on a blockchain and trying to sell itself to gullible zoomers as a "hip" alternative to Tor, paired with an Ethereum token scam.
In short, I smell Web3 all over it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment