If your goal is to truly obfuscate and anonymize, this will not work as any endpoint you run can be easily tied back to you.
Videos
For sharing interesting videos from around the Web!
Rules
- Videos only
- Follow the global Mastodon.World rules and the Lemmy.World TOS while posting and commenting.
- Don't be a jerk
- No advertising
- No political videos, post those to !politicalvideos@lemmy.world instead.
- Avoid clickbait titles. (Tip: Use dearrow)
- Link directly to the video source and not for example an embedded video in an article or tracked sharing link.
- Duplicate posts may be removed
Note: bans may apply to both !videos@lemmy.world and !politicalvideos@lemmy.world
Stop trusting VPS providers! Run your own servers at home!
Unless you infiltrate someone else's network, the endpoint your basic VPN connects to can always be traced back to you.
So, either you trust a VPN company doesn't hold logs and try to hide within all the other traffic.
Or you host your own VPN on a VPS knowing you haven't set up any logging (and hope that your VPS hasn't been tampered with), but then have a static IP that comes back to your identity.
That video makes no sense
A peer-to-peer VPN would be nice, with invites. Only secure if you use HTTPS only, as you would need to trust random people. But you would always have endpoints on residential IPs, meaning block resistance.
Isn't that juat tor?
True kinda. But if the network was between people who know each other a bit, it could make running an "exit node" more safe
It would also make it inherently less private as you all know each other.