If VPNs’ are as private as they claim, how is he going to trace them to fine them?
Exactly - connect to a server out of country and no way they know. Do your research and pick a VPN with high privacy marks.
bttt
Regardless, the fallback is always your own DNS, which invariably is your Internet provider's DNS, by default.
Even if it is your own DNS provider, you do not encrypt the DNS request, by default.
There are ways to do this “just right,” but you have to be quite careful.
If Brazil's government is told by your Internet provider you requested “twitter.com” to get resolved to an IP address—you are getting a door knock. After they get your devices, they will see you accessed Twitter through a VPN.
If you don’t think ISPs can monitor your endpoint connections, you’re a fool. All they have to do is figure out where you are connecting, and even if it’s a VPN, it’s known. The IANA registers IP address ranges. All they have to do is identify that someone on a Brazil telco or ISP is connecting to one of the identified VPN-owned IP addresses, and they can fine them. It’s not difficult.
VPNs aren’t designed to anonymize you to your carrier. It only masks where you’re going on the other end.
“If VPNs’ are as private as they claim, how is he going to trace them to fine them?”
One way is to torture you until you unlock your phone and then see what’s cached (that’s IP talk). If it’s anything from this day forward, then you’re hosed. Obviously they could be led to you in a number of ways: First, they will know you’re on a VPN, so you’re likely in the 1 or 2 percent of people to start with - then, simply a tip from someone and you’re through.
Keep in mind, they only have to catch enough people to keep running Show Trials - others will get the message. Not much different than how the US Justice Department operates regarding conservatives.
I suppose one could log into the various VPN providers and start making a list of IPs. The VPN provider would have IP clients connect to them from certain IPs, before assigning them an IP from somewhere else. You could automate that and see where the local connection is coming from.
Then the government could claim some Brazilian is using that VPN, just because they connected it, and fine them accordingly.
Best to use an unknown server using a temporary address DHCP for a short lease time.
That’s because nothing is private or untouchable to the hitech surveillance people.
All the things there are to give us digital privacy are to keep that kid in mom’s basement from hacking into our goodies.
If all this security were in fact good then there would never be any of these military grade attacks on our government, corporations and all that.
People are grossly ignorant about security. Google offers on their search page to securely store all of your passwords. Any mindless wonder doing this deserves whatever they might get. And who says Google is not selling this info on the side? The same goes for anyone giving their private data for someone else to store, such as a cloud.
If VPNs’ are as private as they claim, how is he going to trace them to fine them?
= = =
That is easy.
“We cannot find any trace of you committing network crime, so you must have been using VPN.”
Off to prison with you.
The only VPN that's private stores ZERO Connection logs, ZERO traffic logs and ZERO payment info.
I've yet to come across one that doesn't store payment information.