Ping.
Bkmrk.
Bookmark.
Rambling ramble ramble blah blah.
SLIGHTLY misleading title.
He is talking about what happens (or could happen) to your data on the other end.
Typically VPN is doing its job during the time of the connection.
Link to the article that the video is based on.
My VPN is based in a country the US government cannot subpoena.
Not that it will matter.
Who you gonna trust?
Skip the middle man and just pipeline direct to the NSA.
Some GS9 can get a little extra nap time that way.
A friend of ours was at an ‘Infra Guard’ meeting at UC Davis last year and an FBI agent let slip to the audience that the FBI is reading VPN and TOR in real time and using the information to catch cybercriminals.
Bottom line is if it is online it is not secure.
Of course a VPN can’t protect us from the stupidity of others safeguarding our data. If you use a VPN and are concerned about private surfing, there are legit no log VPN’s that use RAM disk only, store no hard disk data for any govt to seize and are based in friendly jurisdictions. A good legit no-logs VPN also allows 3rd party verification audits to confirm this.
As far free VPN’s, the old saying applies, “if you are not the customer, you are the product”.
https://restoreprivacy.com/no-logs-vpn/
When Big Brother decides to invade your privacy, they'll just go to your ISP and look at the data.
Use Tor combined with a VPN.
“We’re all gonna die!”
As a 35 year IT professional, I can tell you unequivocally, in 2019 information security and privacy are both illusions. We know about the big, major breaches of information. How many lesser breaches occur that aren’t reported or are never discovered? Many more than we know about I can tell you.
Alexa? SIRI? Google Home? These services are nothing short or warrantless search and seizure.
Good reading. Chris is a so called “ethical hacker.” A rainbow Unicorn if you will- https://twitter.com/VickerySec
When a relative of mine who worked in cyber security for the government told me about a device they had that can read and record the contents of a nearby computer using just the electromagnetic emanations of the device, I knew we were screwed.
As long as there are “exit points” of the VPN, there will be someone (CIA, FBI, NSA, etc.) that can monitor and intercept, record, and even change your data.