this post was submitted on 19 Aug 2024
47 points (86.2% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54716 readers
226 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
To add a bit: It doesn't make a difference whether you're use a cable or the wifi. It's still the same internet connection. What helps is the VPN connection. And it doesn't really matter if you're setting it to your home country or a random one. If it protects you as intended, they can't find you either way. And if it doesn't, you may be screwed either way.
The country of the vpn server does matter, as does the home country. Your traffic may be encrypted and the vpn company may not keep logs, but the datacenters they're renting likely do. Always favor countries that have the strongest privacy laws. i.e. not the US.
Is there some precedent to believe that they correlate (encrypted) datacenter traffic, find the patterns and actually use that somehow?
I mean I can see how that'd theoretically work under certain circumstances and low network load on the VPN server. But that's really complicated, circumstantial, unreliable and takes lots of effort and probably can't be used in court anyways. So I wonder if that's ever been done. Maybe for some circumstancial evidence for some proper crimes to find out where to investigate? And I mean I'm pretty sure the NSA snoops everywhere. Still they're unlikely to be able to look inside with just these tools. And they're also unlikely to prosecute some swedish user for some lame copyright violation.
It happened many times, for example this is the latest https://www.fbi.gov/video-repository/inside-the-fbi-the-911-s5-cyber-threat-061124.mp4/view
They saw the encrypted traffic between the VPN server and the botnet command server, matched with the traffic between ISP and VPN
It took years and years: this extensive investigation with the collaboration of law enforcement of multiple countries is only for big criminals