this post was submitted on 16 May 2024
36 points (100.0% liked)

Technology

37603 readers
538 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

I've never completely understood this, but I think the answer would probably be "no," although I'm not sure. Usually when I leave the house I turn off wifi and just use mobile data (this is a habit from my pre-VPN days), although I guess I should probably just keep it on since using strange Wi-Fi with a VPN is ok (unless someone at Starbucks is using the evil twin router trick . . . ?). I was generally under the impression that mobile data is harder to interfere with than Wi-Fi, but I could well be wrong and my notions out of date. So, if need be, please set me straight. 🙂

you are viewing a single comment's thread
view the rest of the comments
[–] twinnie 15 points 4 months ago (20 children)

Your provider will just see encrypted traffic (mostly), so yes it will provide protection.

[–] dfyx@lemmy.helios42.de 8 points 4 months ago (17 children)

Your provider will just see encrypted traffic (mostly) anyway, so no it will not provide protection. The only thing that you're now hiding from your provider is which servers you're connecting to. Instead you're showing that info to a VPN company whose main business practice is scaring people into buying a product they probably don't need. Think about who you would trust more.

[–] ulkesh@beehaw.org 6 points 4 months ago (7 children)

Your replies all make a very big assumption that the only connections being made, by people who are advocating VPNs, are over https (or possibly ssh) and thus VPN isn’t necessary. There exists more services than that some of which aren’t end-to-end encrypted (many messaging apps, for example).

Also, I agree that at the end of the day, a user is trusting someone not to snoop. But given that ISPs have been proven to snoop (for various reasons), I personally will put my trust in a VPN provider that I have researched and one that has shown a considerable resilience against outside forces. Mullvad comes to mind here.

Yes, a VPN is probably overkill if all the user is doing is using a web browser, nowadays. But it is useful beyond just setting up a tunnel for access.

[–] to55@discuss.tchncs.de 3 points 4 months ago (1 children)

A VPN doesn’t do much to protect HTTP connections.

[–] stephen01king@lemmy.zip 1 points 4 months ago (1 children)
[–] to55@discuss.tchncs.de 2 points 4 months ago (1 children)

Your data still travels across the internet unencrypted. It only protects you on the LAN level.

[–] stephen01king@lemmy.zip 1 points 4 months ago (1 children)

Wouldn't the lan level be the most important part to protect when accessing http website? How likely are your connections to be hijacked once you are outside of your VPN tunnel?

[–] to55@discuss.tchncs.de 2 points 4 months ago

I don’t know how likely that is. But I was a bit too quick in my judgement, on public networks a VPN does ass significant protection to HTTP connections. Not really on home networks, mobile networks or well-secured public/office networks though.

I honestly don’t know how much risk your data is at after leaving the tunnel. Luckily most things are HTTPS now.

load more comments (5 replies)
load more comments (14 replies)
load more comments (16 replies)