• @Quindius
    link
    21 year ago

    That doesn’t change the fact only your traffic is coming from that vps’s ip

    • @[email protected]
      link
      fedilink
      English
      11 year ago

      For every single way that you may be using to reach out the internet, there will always going to be an exit node which won’t be able to hide out itself. You may still use ssl or whatever you want (cant think of anything else that widely used) to encrypt the connection, as you normally do on your computer every time like you try to reach out a server with https. But I still take some actions that are not being encrypted between me and other side which I don’t want to be related with me. So basically, I don’t want some of my traffic to be exposed to ISP or any possible other threat. In order to provide that, I find a vps provider which has enough internet traffic to not use ISP to access internet(like many big tech companies do), and buy a vps from there anonymously(of course my ip is being exposed here but it is also being exposed on other vpn services and I am not doing something that important to make my ip so much important to hide). Afterwards I setup a wireguard or openvpn (depends on your needs) server and connect it from my pc. Which basically works like a vpn service that many people subscribe.

      As far as I can see(if I am not mistaken somewhere), if you have a problem with this kind of protocol, then you have a problem with vpn services itself. And if you have a problem with that, and need more anonymity, you can connect to a public wifi and then a vpn and then a distributed network like tor.