B
B
BotaniQ_Q2017-06-05 23:08:50
Information Security
BotaniQ_Q, 2017-06-05 23:08:50

Are proxies/vpn/ip-facker safe?

For anonymity and security of personal data, it is advised to use all this goodness, but is it safe? Why does no one doubt whether our data is of interest to the person who provides us with such services, etc.? There is a lot of material on the same Tor, how to sniff an exit node, what do you think about it?

Answer the question

In order to leave comments, you need to log in

2 answer(s)
7
7365656c65, 2017-06-05
@73656c6565

I don't think anything is completely safe. There are only ways to make it more difficult for an "intruder" to obtain data about you, ideally, until the costs of searching and analyzing traffic significantly exceed the predicted "economic benefit" from the information that you protect. The first rule of defense is separation. The more echelons in defense, the better. Link to read for a start (fresh), but there are no limits for paranoia. Recipe - "left" vps openvpn with encryption + TOR + beech with Avito on Linux + "left" sim + pgp in communication + only https + "You are in the open world and you are in the dark" these are two different people, no mutual friends, one and the same sites, numbers, postal addresses, etc...

C
CityCat4, 2017-06-06
@CityCat4

Absolute security does not exist. All security is built on the principle of "make access difficult so that there is no point in breaking".
Example. SMS from the bank consists of 6 digits, in total there are a million options. But the time for entering SMS is ten minutes - does it make sense to select it?
Any security starts with an intruder model - with a definition of who (what) you are protecting yourself from. If you want to hide the fact of watching porn from your wife - this is one thing, if the fact of looking for a job from the boss is a little different, if you want to get into politics - quite a third. Different intruders have different resources. And you should always remember one thing - the most vulnerable link in this entire chain is you yourself. When interest in you exceeds a certain threshold, you will be found, no matter how many tors, VPNs and proxies there are.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question