this post was submitted on 06 Oct 2024
728 points (90.7% liked)

Technology

59555 readers
4488 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

you are viewing a single comment's thread
view the rest of the comments
[–] sugar_in_your_tea@sh.itjust.works 9 points 1 month ago (3 children)

There are plenty of legitimate uses for their services, they just aren't things that the vast majority of people actually need. For example:

  • access things in a LAN from a WAN - i.e. access a personal PC when you're at a friend's house, and your home LAN is behind CGNAT
  • get around local laws - e.g. my state requires ID checks for porn and social media, so getting a VPN one state over gets around that
  • prevent ISP from seeing the sites you visit - very valid privacy concern, especially since SNI exists to de-mask TLS packets

There are also some sketchier needs, such as:

  • get different content on your streaming platform
  • hide sharing of illegal content (i.e. piracy)
  • perform illegal transactions (e.g. going on Tor to buy drugs or whatever on the black market)

I think VPNs are trying to appeal to more than just the above needs, they're trying to create needs to grow their marketshare. That isn't something a reputable VPN should do, or at least that's something that would make me hesitate to use a given VPN.

[–] PriorityMotif@lemmy.world 7 points 1 month ago

If you want to give an anonymous video to the press or the police. If you don't hide your ip then it isn't anonymous and they'll come question you.

[–] uid0gid0@lemmy.world 1 points 1 month ago (1 children)

The only thing you need to say is "my ISP uses CGNAT" you can't host anything or run games for your friends without a way to punch through the CGNAT layer. I mean you could use IPv6 if it weren't still a joke in the US but here we are.

Yup, CGNAT sucks. But STUN works fine for me, and most games support it, so it's not a huge issue.

I could pay extra for a public IP, but for the same price I can get a VPS and do other cool stuff, so I just went the WireGuard VPN route. Same end result with a little more latency, but also more flexibility. I host a few static sites directly on the VPS, with everything else going through the VPN, so that's nice.

[–] dan@upvote.au 1 points 1 month ago (1 children)

get around local laws

That's not a legitimate use; it's an illegal use just like piracy is.

especially since SNI exists to de-mask TLS packets

ECH will finally fix this. https://blog.cloudflare.com/encrypted-client-hello/

SNI is still better than what we used to have. Before SNI, every site that used TLS or SSL had to have a dedicated IP address.

That’s not a legitimate use; it’s an illegal use just like piracy is.

My understanding of the law (and yes, I read it) is that it's not illegal. The law in my state is for service providers to authenticate the ID of any state resident, it's not a requirement on the resident themselves. The service provider isn't aware what state I'm a resident of, and state law doesn't apply outside the state, so I don't know what law would be violated here.

SNI is still better than what we used to have.

I absolutely agree, and I actually use SNI to route packets for my homelab. Without SNI, I would have to route after handling certificates, which would be annoying because I want TLS to work within my home network, and I mess w/ DNS records to point to my local IPs when inside my network. I could have everything routed through a central hub (so one dedicated machine that handles all TLS), but that's a single point of failure, and I'm not too happy about that. Or I guess I'd have multiple IPs, and route based on which IP is being hit.

I'll have to check out ECH. Hopefully I can eat my cake and have it too.