1. 27

  2. 8

    Wireguard (easiest, Linux only)

    I’m fairly sure that wireguard works at the very least on ios, macos, windows, and android. Which seems as close to ‘everywhere’ as it gets with modern software.

    1. 2

      Unfortunately it still requires an out of tree driver on Linux, or super power-hungry userspace driver on Android.

      1. 2

        super power-hungry

        It’s not too bad, in my experience (been using it for a month, and it hasn’t shredded my battery yet :p). That said, ideally kernel support would be better.

    2. 5

      @SirCmpwn, you might want to add a warning about jurisdictional risk in section about rolling your own VPN’s. A reminder that readers consider the local laws in the country of the hosting service. If the laws enable or allow privacy, then vetting the service itself might be enough. If it’s a surveillance or highly-corrupt state, then they’re either going to be forced to share data, maybe secretly, at some point.

      1. 5

        It might be just my impression, but one of the main reasons for some people to use a VPN is to torrent safely, without lawyers catching up on someones home-ip address, and annoying them with legal threats. Under these needs, the barrier lowers itself from that described in this article, if you ask me.

        1. 3

          I’ve actually wondered about that. Is there any evidence that’s actually protecting people from lawsuits? Has anyone done any research to see if people behind VPN’s were getting hit with lawsuits or copyright charges? And which VPN’s were resisting such claims successfully?

          1. 4

            At my university the network people were supposed to be able to match up students and IP addresses. This had two observable consequences:

            1. you got caught torrenting pretty quickly
            2. every hour when classes switched the thousands of people jumping wireless access points would blow through all the IP addresses available, and no one would be able to connect to wifi until 10 minutes after hour when the DHCP leases from the previous class switch started expiring

            But if you used a VPN, even a crappy one, you never got caught torrenting.

          2. 1

            Still, torrenting is a wait. So, then you go off to do your banking while that VPN is connected.

            I also know some people who just leave it on permanently at the router level, to either avoid hassle or to make their STB / NAS work with it. When I try to tell them about the privacy aspects, they don’t seem concerned at all.

            1. 1

              your original IP address, which can be used to derive your approximate location (often not more specific than your city or neighborhood)

              Well, screaming “I’m from neighborhood X” to all sites you visit is pretty scary.

              Bad actors on the Tor network can read and tamper with your traffic if you aren’t using SSL or Onion routing

              Tor always uses onion routing :) s/Onion routing/hidden services/. And considering how little is non-TLS these days, it’s not a giant concern.