Cross-post!

  • ShortN0te
    link
    fedilink
    arrow-up
    38
    arrow-down
    2
    ·
    10 months ago

    So? Another shitty VPN product from a shady company?

      • ⲇⲅⲇ
        link
        fedilink
        arrow-up
        17
        ·
        10 months ago

        I think he got problems because of piracy/copyright issues, not because of privacy.

        • sabreW4K3@lemmy.tfOP
          link
          fedilink
          English
          arrow-up
          11
          arrow-down
          2
          ·
          10 months ago

          I mean being charged with facilitating international piracy in an age where big corporations are using whatever they can as an in to harvest your data is pretty pro privacy IMO, but I get what you’re saying. By no stretch of the imagination were his actions guided by anything other than profit.

          • ⲇⲅⲇ
            link
            fedilink
            arrow-up
            4
            ·
            10 months ago

            Yeah, and I was checking the web and I can’t see much info about how they secure our data. I just can’t trust them. 🙄 I hardly trust ProtonVPN already. 😄

      • ShortN0te
        link
        fedilink
        arrow-up
        7
        arrow-down
        1
        ·
        10 months ago

        Money is not the right reason. Megas history only shows that they were interested in money, everything else was just a publicity stunt. Mega even got sold a few years back.

  • oDDmON@lemmy.world
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    10 months ago

    Seeing “security companies” tagging VPN IP blocks as sus, is becoming all too common; just like ad blockers are being banned.

    They wanna know who you are, where you’ve been, what you’re doing and how you’re doing it…AT.ALL.TIMES.dammit!

    • Dran@lemmy.world
      link
      fedilink
      arrow-up
      6
      ·
      10 months ago

      Context/region blocking is a very quick and inexpensive path to basic security. At work I have sets of iptables rules to block regions by country code and by context (i.e VPN provider, datacenter provider, etc). I’ve found that some services will go from tens of thousands of brute force attempts per day to 1-2 per month. It really is crazy the amount of routine attacks that come through VPN providers if you host services in the professional world.

      Does this mean that legitimate users can’t use a VPN to access our services? Yes, but we also don’t sell any data to any third parties so I don’t feel so bad about it.

      • oDDmON@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        10 months ago

        In your case prevention of DDOS via VPN guides your decisions and legit VPN users are collateral damage.

        I understand your position, and as you say, no data is sold, so no real harm.

        Perhaps banks are the same way.

        But out of the ones I have to deal with, only one makes me drop the VPN for access. /smh