mishari / th-digital-survival

คลังข้อมูลวิธีการเอาตัวรอดด้วยอุปกรณ์ดิจิตอล
Creative Commons Zero v1.0 Universal
49 stars 10 forks source link

VPNs #5

Open srakrn opened 4 years ago

srakrn commented 4 years ago

What should this section be about

What should not this section be about

srakrn commented 4 years ago

I would like to volunteer on this.

whs commented 4 years ago

I wrote a piece on network privacy here https://blog.whs.in.th/node/3354 , feel free to copy anything there under CC0.

Had a second read a while ago after I wrote it and I think it's too much technical. (On the other hand, not going into technicality at all might result in the reader not believing that the attack is real. Maybe move them to appendix section?) So I'd recommend a rewrite. The VPN recommendation there isn't good either; it was intended to be a review of well known VPN providers instead of recommending ones to use.

mishari commented 4 years ago

I just added an item to the TODO on metadata analysis.

srakrn commented 4 years ago
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

I should make some note regarding VPN service recommendation:

Personally, I believed it's a totally acceptable tradeoff
to recommend some VPNs since most end-users wanted the
answer and not the solution to the answer.

Yes, mentioning the criteria on selecting a good VPN provider
is a must, and I'm looking forward to that. However, I think
it'll be good to let user check either
[That One Privacy Guy](https://thatoneprivacysite.net/#simple-vpn-comparison)
or [PrivacyTools.io](https://www.privacytools.io/providers/vpn/)
for the recommended provider.
-----BEGIN PGP SIGNATURE-----
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=Sj8o
-----END PGP SIGNATURE-----
mishari commented 4 years ago

How about just TOR? I can see how easy it would be easy for a well financed adversary to setup and spread a VPN provider to be used as a honeypot. Tor is slow, but it is safe.

pe3zx commented 4 years ago

@mishari

It depends on the approach we want to purpose.

With only Onion Browser on a platform like iOS, it can consider "safe" if we restrict ourselves to communicate only on this channel while VPN could provide a more extra and depth layer seamlessly for other apps, and it can also be used to prevent ads tracking and accessing malicious sites.

I'm not sure what's the approach this project would likely take between recommending the best solution in our opinion or suggesting any available options and let a reader choose.

Should we make this clear first?

mishari commented 4 years ago

We should be opinionated and recommend best practices, tools, services. Non technical users will rely on us for answers.

On Sat, 29 Feb 2020, 11:32 pe3zx, notifications@github.com wrote:

@mishari https://github.com/mishari

It depends on the approach we want to purpose.

With only Onion Browser on a platform like iOS, it can consider "safe" if we restrict ourselves to communicate only on this channel while VPN could provide a more extra and depth layer seamlessly for other apps, and it can also be used to prevent ads tracking and accessing malicious sites.

I'm not sure what's the approach this project would likely take between recommending the best solution in our opinion or suggesting any available options and let a reader choose.

Should we make this clear first?

— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/mishari/th-digital-survival/issues/5?email_source=notifications&email_token=AAD2Z2XUYGAELKHN2PU65YTRFCHULA5CNFSM4K46EUP2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOENLGTFY#issuecomment-592865687, or unsubscribe https://github.com/notifications/unsubscribe-auth/AAD2Z2QFRXJSVCBLUC5PK2LRFCHULANCNFSM4K46EUPQ .