|
not sharp enough for you?
Sin tack
the any key okay
|
|
|
|
|
I was lost in something else...
|
|
|
|
|
You've really got to start going home more. The time spent in your favourite abode is starting to addle your brain.
|
|
|
|
|
My brain was addled before coming in...
|
|
|
|
|
For some self-serve Q&A, I give you the MSDN of C++.
If MSDN was good at documentation.
cppreference.com[^]
|
|
|
|
|
cppreference.com is/was a goto for me!
|
|
|
|
|
This[^] reminded me of how fond of puns some people are here.
The language is JavaScript. that of Mordor, which I will not utter here
This is Javascript. If you put big wheels and a racing stripe on a golf cart, it's still a f***ing golf cart.
"I don't know, extraterrestrial?"
"You mean like from space?"
"No, from Canada."
If software development were a circus, we would all be the clowns.
|
|
|
|
|
|
Ive literally just returned from the best chippie in town
its a great plaice (sorry)
|
|
|
|
|
That's an old one.
I think I read it in Readers' Digest in the 70s.
|
|
|
|
|
Then you must be a real pundit.
The language is JavaScript. that of Mordor, which I will not utter here
This is Javascript. If you put big wheels and a racing stripe on a golf cart, it's still a f***ing golf cart.
"I don't know, extraterrestrial?"
"You mean like from space?"
"No, from Canada."
If software development were a circus, we would all be the clowns.
|
|
|
|
|
A word abbot that comment: be careful!
Fools rush in where brave men fear to tread.
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
I try not to puntificate on puns.
".45 ACP - because shooting twice is just silly" - JSOP, 2010
- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
I'm so fed up with more and more applications (including Windows itself) requiring internet connections and sending out tons of data with little or no control about what is sent and what it is used for. Also, more and more web sites liberally use geolocation data to artificially restrict what I can use, and how.
While in some cases, there may be a legal foundation for this behaviour, I doubt that is true most of the time. It doesn't seem like anyone even cares to point that out - which to me is just another red flag, and I am well within my rights to deny that information.
Anyway, I was wondering about ways to at least confound all these user data abusing techniques. There are only two things that came to my mind: using TOR, and using a VPN. I'm not sure how much either will help, but I understand that for VPN I need to choose a provider. Different providers provide different services, for a price - or, sometimes, free. And I have no idea what to look out for.
So, my question to the community is, do you have recommendations for a first-time VPN user who just wants to retain a lttle more control over his personal data, even if obtained only through obscurity? I don't mind if down/upload speeds go down a bit.
Also - this might be a stupid question, but I simply don't know - would it affect my choice of VPN if I were to use TOR, or does it even make sense to use TOR over a VPN?
P.S. (2017-4-10): best info found so far: That One Privacy Site | VPN Section[^]
GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)
modified 10-Apr-17 9:05am.
|
|
|
|
|
Another option might be to set up some sort of self hosted proxy server?
|
|
|
|
|
Consider me a total noob regarding networking, but wouldn't a proxy run at the same location, by myself, defeat the purpose of obfuscating that information?
GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)
|
|
|
|
|
You can get remote proxys also, but if Geolocation is your biggest concern, then VPN might be better option.
If it's more about preventing data flowing in/out of your internet without your knowledgethen you could use a proxy to monitor/prevent/block traffic into and out of your network.
|
|
|
|
|
The other option is to use 1-NET gateways .
VPN works at IP level which makes it invisible to applications once it is setup properly. But there are at least three drawbacks:
1) it requires at least one LAN (local area network) to have a public IP which is expensive or to use some kind of dynamic IP/name mapping services.
2) VPN connected LANs can not have same (private) IP address space, otherwise VPN will not know how to route data. Since most LAN are setup using default private IP space, it is most likely that they will collide in IP space without readjusting. This makes it not scaleable.
3) Setting up of VPN is not easy.
I have almost zero knowledge about TOR however both TOR and 1-NET gateways uses SOCKS protocol to connect client applications.
1-NET gateways do not have the above limitations of VPN, namely it does not require to acquire any public IP address, it is scalable since it does not require to make any change to existing LANs and it is easy to setup.
It is under internal testing right now. The present message is in fact sent to codeproject through a pair of above mentioned gateways separated by Pacific ocean connected by a very slow line: one is in Asia and the other one is in North America. It can make use of a user's network bandwidth very efficiently, meaning it can be very fast as long as the network bandwidth is high.
We are using it to do web browsing, trans-LAN administration (ssh, remote desktop, etc.) now. It can be used by any software system that knows how to talk via SOCKS.
Drop me a note if your are interested in testing it when it is ready (including finishing documentation, packaging, etc.) ...
modified 7-Apr-17 6:09am.
|
|
|
|
|
Thanks for the suggestion but it doesn't seem 1.NET offers anything I don't already have. More importantly, it doesn't appear to offer any of the obfuscation I was hoping to gain by using a VPN and/or TOR.
As for VPN disadvantages, I am sure there are some, but if it's the only way to achieve what I want, that may not be relevant.
GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)
|
|
|
|
|
If obfuscation is what you are after, then VPN only offer a leaky protection since it works at IP level. The domain names have to be resolved before leaving the entry point of VPN, which means your applications (browser or anything else) have to make requests to local DNS providers ...
1-NET and maybe TOR can let the other end of the "VPN" tunnel to make DNS requests for you and thus transfer you browsing history completely to the other end ...
|
|
|
|
|
I don't know what you mean by it being leaky. Once you are connected to the VPN, DNS requests will go encrypted through the VPN as well. VPNs would be kind of pointless if that wasn't the case.
|
|
|
|
|
I am talking about true VPN working at IP level, in which case the application has to resolve any none IP address into IP before using VPN ... Any one that claim otherwise is not providing true VPN service (they most likely are providing one endpoint SOCKS proxy service, but it's different from 1-NET which contains pair of SOCKS endpoints that forms a secured tunnel)
Suppose a user has two zones (LANs), one is the one he/she want to secure (obscure, in OP's word) and the other one is "safe" and the application is in the first zone. The user want to delegate all his/her internet activity to the second one. If one use VPN to connect (tunnel) the two zones, the all the network layer "authorities" (service provider, ISP, etc ...) in the first zone still know what the use is doing since the use is making DNS requests in the first zone and they can control what are visible by the user by controlling the DNS providers. That is what leaky mean in my post. But using 1-NET secured tunnels, one can choose to do DNS requests inside the other zone ...
modified 10-Apr-17 16:02pm.
|
|
|
|
|
Abso-effin-lutely not. I don't know who you got that information from but it is 100% wrong. When you are connected to a VPN your DNS server becomes the DNS server assigned to the VPN connection, not your ISPs DNS server, and all DNS requests are encrypted and tunneled like all other packet.
How do you think connecting to a corporate intranet through a VPN would work if it was using your ISP's public DNS server to resolve requests? It wouldn't...
VPN doesn't work "on an IP level", it works on a packet level.
|
|
|
|
|
Unfortunately, sometimes your browser will just ignore that you have a VPN set up and will send the DNS request straight to your ISP. That’s called a DNS leak. This can lead to you think that you’ve stayed anonymous and that you’re safe from online surveillance, but you won’t be protected. How DNS Leaks Can Destroy Anonymity When Using a VPN, And How to Stop Them[^]. Therefore it's not 100% after all ...
I mean works at level 3, level 2 knows no IPs so it does not know how to route base on IP addresses
|
|
|
|
|
The way you were describing it before you were implying that it is intended that VPNs work that way and all of them work that way, that you *WILL* get leaky protection from a VPN. That's not the case. If that's happening, its a bug or a bad configuration.
As the article you linked to states, most of the top VPN providers provide leak detection/prevention already, so a good VPN is a perfectly reasonable way to fully protect yourself.
|
|
|
|