Quote:
Originally Posted by GhostRiderYYZ
But is a log-less VPN any good?
And what sort of activity would you need to be hiding from the government? Looking at legal porn? not even worth their time.
searching for drugs on the dark web? you need a TOR browser for that so that helps
|
Depends on your individual threat model. If you're on the Feds radar you probably have bigger issues to worry about and it's too late to try and cover stuff up.
Personally, I like to think it's no one else's business. The IT guy at work (which is me) or my ISP network guy (whom I know a few and largely don't give a rat's ass (like me), until there's a subpoena (or HR request).
My personal threat model is -
1. my wife (not very tech literate), but just in case she gets someone else who is.
2. Private Investigators / Lawyers - If there's a subpoena, it's too late (see #1) and cleaning you're own trail is important. If there is a subpoena, why make it easy for them? If someone wants to see my records, there aren't going to be any and if there are they're going to have to work freaking' hard for them.
They want something - make them work for it. Cops have become lazy because all they have to do is browse social media, security cams and cell phone records, cell tower records or physically get the cell phone. Not worried about the local PD, but basically none of their business either.
TOR has become an Intelligence honey pot. A bunch of nodes are run by an agency of some sort. A bunch are run by normal people (I've run a starting node before, never an exit node) So good opsec is still needed, don't only rely on TOR for security. It's only 1 layer of that Onion. (get it?)