VPN vs Proxy vs Mix of them

talk about your computer or ask what program to use or what video card you like. others includes things like wordlists or color temps on monitor
Post Reply
User avatar
Legu
Allie
Allie
Posts: 232
Joined: Sun Dec 18, 2011 6:47 pm

VPN vs Proxy vs Mix of them

Post by Legu »

So this is more like a security question.

What is the most, most most secure way to "use" the internet?

a.) use a proxy
b.) use a proxy within a proxy
c.) use vpn
d.) use vpn and then a proxy
e.) "ur way" ?

Also im not sure if "b" and "d" would make sense but hey thats the topic for...
(Also if b should be the most secure way, how many times do u need to use different proxies? Like u can say after 11 proxy servers, it doesnt matters)
User avatar
Sethioz
Admin
Admin
Posts: 4762
Joined: Fri Jul 27, 2007 5:11 pm
Custom: Gaming YT > https://youtube.com/SethiozEntertainment
Game Hacking YT > https://youtube.com/sethioz
Game Hacks Store > https://sethioz.com/shopz
Location: unknown
Contact:

Re: VPN vs Proxy vs Mix of them

Post by Sethioz »

that depends, how you define "secure".

* if you are worried about adware, popups, spyware ..etc, then firefox or opera with some plugins will do just fine, no proxy needed.

* if you are worried about being tracked when downloading pirated / illegal stuff, then proxy is a must have, however it won't matter how many proxies you use, because if all of these proxies keep history, they will eventually get to you. it also depends how seriously you violate laws, if you would hack into FBI, they would probably go all the way, proxy after proxy, until they find the source or run into dead end, where proxy does not keep logs.

i heard that in germany, t-mobile or something like that is not allowed to keep logs at all, meaning if you do whatever you do, then request new IP (if IP is not static, then just reboot router), then that's it, you're secure, because ISP won't keep any logs, so there is no way for them to know which of their clients were using that IP at the time. if you're using such ISP, you have nothing to worry about at all, change IP once a day or after each "illegal" act and you're good.

* if you are worried about viruses / trojans, then none of this helps. everything comes into your pc via proxy and can seriously fuck you up.


VPN - virtual private network, this won't really help, as far as i know, it is meant for secure transfers. for example if you have many people using same internet, like in schools ..etc, then it is possible to monitor the traffic. VPN eliminates the possibility to monitor, it uses secure connections. it is still possible if you get encryption keys and such, but very unlikely. so i don't think it would help you much. however it should help, if you want to transfer illegal stuff from computer to computer remotely. that would eliminate "red flags" and other alerts that ISP might get whenever something is transferred.

- red flag - think of it as virus signature. they don't talk about it in public, but they silently red flag government files / data. so whenever you use even 100 proxies, as soon as this data is recieved by your ISP, they will get a "red flag" going off, so they know someone using that connection have accessed some top secret data. i doubt all ISPs have red flags, most likely only in USA and countries who have some contract with USA, don't know. in that case, proxy won't help, but VPN would help.


also proxy can be vulnerability, if proxy is unknown source, whoever is hosting proxy, could be monitoring all the traffic and whenever you use it, they will see everything you do. if you log into your accounts, they might steal your info.


That said, best proxy ive came across is TOR with Vidalia control panel. google for "vidalia bundle". it shows up as vidalia browser bundle, but its kind a crap. i use "vidalia bundle". it routes you via 3 proxies, before going to its destination. i find it quite secure. i use it to download torrents when im using friend's internet or other place where i can't take any risks with illegal software.



Best for me > MY WAY.
i crack somebody's wireless network and use that. 100% untraceable.
well ofcourse it is stupid idea to use your real name as computer name, then they would know who it is. I also use fake MAC, so they can't track my wireless card by vendor. not just fake, but clone. i monitor wireless activity and clone some random MAC i come across with and use that.
+ if i need super security (dont want to share my location either), then i use TOR too.
there is no force on earth that can track that.
still gotta be careful, if you would hack into FBI and do some damage, they would probably go from house to house and check all the hardware and compare computer name + wireless adapter's MAC.



NOTE - if they accept ACTA law, then i doubt any of these methods work. they will red flag everything that is copyright, so proxy won't save you and as far as i know, it is not allowed to use encrypted connections at all, it is considered as crime, it is kind a retarded, maybe this is why they did not accept ACTA yet. because so many websites use https (encrypted connection) + VPN built into lot of tools, like teamviewer.

bit offtopic, but have anyone else (not in some crazy countries like russia, india..etc) noticed that internet is generally SLOW and sluggish ?
i think they are silently testing out ACTA, this is why all those cutouts and lag. around here, everyone are saying that internet has some very odd lag times.
User avatar
Legu
Allie
Allie
Posts: 232
Joined: Sun Dec 18, 2011 6:47 pm

Re: VPN vs Proxy vs Mix of them

Post by Legu »

First of all...very detailed answer, just the way i wanted to see it. still i have some questions.
etc, then it is possible to monitor the traffic. VPN eliminates the possibility to monitor, it uses secure connections.
Whats the difference between monitoring the traffic and just monitoring?
Either way, i had like to test some xss, and stuff like that, mybe try some reverse_tcp with exploits on some random noobz as well.
For that i probaly had use hotshot shield. It is a vpn sys, and thx to an uploader on kat.ph i have the verison that auto-updates, so it is basicly the elite version.
U mentioned tor. I really did try to get the tor bundle, but it seems to be impossible. All i can get from the official site is the tor bundle BROWSER. Which is as far as i see a browser which hides ur identity. So as far as u use any other browser or some programs, ur fake identity is gone, which is not so good. (Hotshop covers everything)
Hacked wlan, yeah, did it aswell but the speeds are shitty :/

About the offtopic thing, no, i dont see any lag, and im in europe.
User avatar
Sethioz
Admin
Admin
Posts: 4762
Joined: Fri Jul 27, 2007 5:11 pm
Custom: Gaming YT > https://youtube.com/SethiozEntertainment
Game Hacking YT > https://youtube.com/sethioz
Game Hacks Store > https://sethioz.com/shopz
Location: unknown
Contact:

Re: VPN vs Proxy vs Mix of them

Post by Sethioz »

you really need to pay attention to what you doing. i admit, it is not easy to find the vidalia bundle, but its far from impossible, you just need to open your eyes and go over the site slowly and pay attention to all links. there is a link "view all downloads" that takes you to this page > https://www.torproject.org/download/download.html.en
and 2nd one down the list is vidalia bundle.

however if you use it incorrectly, you can still leak your IP out, like remote / local host resolving, don't use proxy in peer2peer ..etc. lot of programs have such options, like torrent programs. you need to route everything via TOR in order to be 100% behind proxy. also TOR does not support UDP protocol at all, it only supports TCP.
in fact its quite difficult to find UDP proxies that work properly.

Whats the difference between monitoring the traffic and just monitoring?
huh?? there is no difference or what the hell do you mean?

best way to find out how stuff works .. ..is to well, find out how it works.
get CommView (or some other good packet monitor tool) and montior your traffic, then you see what is going on. your ISP is always able to see all that, however they are not allowed (by law) to do so, unless they are told to do so by law enforcers.

all this is too long to explain, you need to do research on how computers work before going any further. like how IP (internet protocol) works, what is UDP, what is TCP ..etc ..etc.
how to monitor wireless networks, how to decode / decrypt packets and https ..etc
Post Reply