• m-p{3}@lemmy.ca
    link
    fedilink
    English
    arrow-up
    89
    arrow-down
    2
    ·
    edit-2
    17 hours ago

    Considering how most of the Internet is encrypted with TLS, if you add DNSSEC+DoH/DoT on top, trying to MITM someone on a public WiFi is way harder than it was, unless you’re a state-level adversary and you’re able to craft valid certificate for a domain you don’t control from a globally trusted (root) certificate autority (which will lose its trusted status quite fast once discovered, ex: CNNIC)

    • linearchaos@lemmy.world
      link
      fedilink
      English
      arrow-up
      39
      arrow-down
      1
      ·
      17 hours ago

      Yeah, the days of your local coffee shops Wi-Fi being a problem or mostly gone. Not the VPN doesn’t have a place anymore though. If you’re trying to hide your downloading of ISOs from your ISP it’s still a perfectly reasonable method. Or temporarily relocating yourself to another country to make a purchase or watch some streaming content both perfectly reasonable.

      Of course some of the streaming providers are getting wise to this.

          • Warl0k3@lemmy.world
            link
            fedilink
            English
            arrow-up
            10
            ·
            16 hours ago

            It’s all fun and games until a Microsoft Purity Enforcement squad is kicking in your door.

            • linearchaos@lemmy.world
              link
              fedilink
              English
              arrow-up
              8
              ·
              16 hours ago

              Nah, it’s all good I subscribe to Linus Torvalds protection services. When the Microsoft vans get within four blocks of my address, They’ll drop ship in dozens of fully-armed penguin paratroopers. After the incursion they even send in a penguin based cleaner team to help get rid of the remains.

        • jonne@infosec.pub
          link
          fedilink
          English
          arrow-up
          5
          ·
          12 hours ago

          You don’t want their admin to contact you about how you’re a n00b for not using Arch.

        • catloaf@lemm.ee
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          1
          ·
          14 hours ago

          Because we see which distros you’re using, and we judge you for it.

          Gentoo, in 2024? Really? You should be using Arch if that’s your thing. It’s not the 90s any more.

          • kameecoding@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            7 hours ago

            Arch? I prefer EndeavorOS as it lets me easily install an arch distro using a nice GUi, I really don’t care about the nitty gritty of setting up my own network manually, i am like 99.9% of people in that regard

        • linearchaos@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          16 hours ago

          Yeah, pptp will always have a strong purpose and home. I’m more speaking to the viability of commercial anonymization VPN.

          • anamethatisnt@lemmy.world
            link
            fedilink
            English
            arrow-up
            5
            ·
            14 hours ago

            I have a feeling you are using pptp as shorthand for Point to Point disregarding protocol and already knows what I’m about to say. To anyone else reading this - PPTP is obsolete and unsafe. Use an alternative such as OpenVPN, WireGuard or SSTP.

            • linearchaos@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              6 hours ago

              Tailscale FTW. I honestly haven’t looked at the underlying protocols in years. Was using ubiquiti’s implementation of openVPN but it seemed to get grumpy when you connect one user multiple times.

              Poking around at available products, I had settled on zero tier and tailscale, I went ahead and tried tail scalefirst because it was basically free for my house. One month in, I had a few decent detectable guys at work join me on a trial there. Full licenses for everybody at work cost less than my Cisco refresh. And makes it so that the office is no longer a critical hosting site.

    • hamsterkill@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      46
      ·
      17 hours ago

      Not all applications on your computer may be encrypting their packet traffic properly, though. That goes especially for the applications that might be trying to reach out for resources on your local home network (like printers, file shares, and other home servers) as well as DNS requests which are usually still made in the open. I would not recommend eschewing an entire security layer willy-nilly like that. On public Wi-Fi, I would definitely still suggest either a VPN or using your cell phone as a tether or secure hotspot instead if possible.

      • MimicJar@lemmy.world
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        5
        ·
        16 hours ago

        Sure, but it’s also like, if you’re stepping away from your laptop for a few minutes should you lock the screen or shut it down completely.

        The most secure option is to shut it down completely, but also it’s fine to just lock your screen.

        If you’ve already got a VPN and it’s as easy as locking your screen to enable, go for it, use it. But if you don’t, you don’t need to go out and get one. You’ll generally be ok without one.

  • EnderMB@lemmy.world
    link
    fedilink
    English
    arrow-up
    113
    arrow-down
    2
    ·
    11 hours ago

    When I first saw this I thought it was funny. The fact that so many people are falling for it has only made it even funnier.

    FWIW, Haley Welch might seem dumb as bricks, but she also seems quite sweet - doing charity stuff, keeping her other friend from “that” vid for the ride, etc. As far as people becoming famous for bullshit reasons goes, she seems to be handling it well.

      • triptrapper@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        arrow-down
        3
        ·
        4 hours ago

        You think she’s not handling fame well because she’s setting clear boundaries, and reminding fans that she’s not their friend just because she’s famous?

        • NineMileTower@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          2 hours ago

          No, because she has a reaction video to every single negative thing anyone says on TikTok. I’m all for her boundaries.

    • Faresh@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      2 hours ago

      I didn’t know who she was, so I just assumed it was true and that she was just another celebrity sponsored by a VPN company.

    • Flying Squid@lemmy.world
      link
      fedilink
      English
      arrow-up
      69
      ·
      7 hours ago

      I feel bad for her, honestly. She was open about her sexuality and she’s conventionally attractive, so now she has all these leering old men on TV slobbering all over her.

      Bill Maher practically tried to talk her into bed on his show with his creepy shit about mentoring her.

      • TheGrandNagus@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 minutes ago

        You know, you’re the first person I’ve seen that’s shared the same view as me (not that I’ve spoken about the topic much! lol)

        Woman admits that she has performed an extremely benign sexual act before - ghasp! A girl has given someone a blowjob before!

        And more than that, she has a “dumb” accent! Let’s make endless memes about her online basically calling her a slutty moron.

        • Flying Squid@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 minutes ago

          Honestly, I never understand why people like this get the level of fame that they do, but at least stop creeping on the poor lady.

      • Urist@lemmy.ml
        link
        fedilink
        English
        arrow-up
        20
        ·
        6 hours ago

        Oof. What is up with these creepy, sweaty dudes on talkshows? I know they somewhat reflect the general populace, but to pull shit like this on air is just boggling.

        • lud@lemm.ee
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 hour ago

          They don’t reflect the “general populace” it’s just that you kinda have to be an asshole to become famous or you become an asshole afterwards.

  • chagall@lemmy.world
    link
    fedilink
    English
    arrow-up
    32
    ·
    18 hours ago

    This was poorly executed. The National Park Service twitter account does jokes well.

  • LEDZeppelin@lemmy.world
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    4
    ·
    16 hours ago

    Taking cybersecurity advice from someone called Hawk Tuah is modern day version of clicking banner that says find 40+ single women in your zip code

    • thirteene@lemmy.world
      link
      fedilink
      English
      arrow-up
      49
      arrow-down
      8
      ·
      15 hours ago

      Hailey “Hawk Tuah” Welch is an influencer that gained a lot of popularity from her nickname (the sound of spitting, with HEAVY implications of performing fellacio). She used her platform to voice a very reasonable and intelligent opinion, which surprised a lot of people because her nickname is essentially blowjob queen.

      One of her opinions is that it’s important to spread cyber security and used her fame to try to educate the public (potentially a fake story from the image? Idk this drama). And some xit-head claiming to be a cyber security expert ate the onion and offered some shitty advice. Proton fact checked them, because there are a ton of fake news stories about her right now.

      • catloaf@lemm.ee
        link
        fedilink
        English
        arrow-up
        28
        arrow-down
        4
        ·
        14 hours ago

        I’m pretty sure that Proton quoting her in the first place is fake. I know she’s milking her 15 minutes of fame for all she can, but this seems outside her experience.

        • tb_@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          12 hours ago

          but this seems outside her experience.

          When has that ever stopped people from saying shit.

  • RegalPotoo@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    24
    ·
    16 hours ago

    The only real use case for VPNs is to bypass geo blocking on streaming sites, and the VPN providers know this. They also know that if they lean too hard into that, eventually someone will sue them and their business model will evaporate - so they add the “iT MaKEs yOu mORe SeCurE” nonsense as a fig leaf so they can say with a straight face that they operate a product with legitimate uses

    • undefined@links.hackliberty.org
      link
      fedilink
      English
      arrow-up
      4
      ·
      12 hours ago

      I can’t say VPNs are great for bypassing geo restrictions in 2024, unless you’re talking about tunneling through your home network.

    • Ilovethebomb@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 hours ago

      That is definitely what 90% of people use them for.

      I think Tom Scott is the only person who’s ever done an honest VPN sponsor read.

      • BallsandBayonets@lemmings.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        8 hours ago

        Ryan George too, he’s very clear in his VPN ad reads that he uses them to access streaming that isn’t available to him in outer space (his shtick is that he’s an ADstronaut).

  • chrischryse@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    ·
    2 hours ago

    So I’m confused networking stuff has never been my strong suit, is this saying you can still be fucked on public WiFi even if you connect through a VPN?

    • Encrypt-Keeper@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      29 minutes ago

      No, the context is that for many years, shady commercial VPNs would sponsor YouTubers and the scripts they were given were full of lies and half truths about the dangers of public WiFi, with the implication being that if you purchase their VPN service they will “protect you”. But the problems these VPN companies were claiming to solve have already been solved by HTTPS and it’s perfectly fine to use public WiFi without a VPN. They are using scare tactics to sell you a product.

      What this poster is saying is that they’re disappointed to see this same fear mongering misinformation from Proton, who have an otherwise good reputation for being consumer friendly.

    • ripcord@lemmy.world
      link
      fedilink
      English
      arrow-up
      16
      ·
      2 hours ago

      Networking stuff IS my strong suit, and I’m confused about what points most people here, including OP, are trying to make here. Maybe I’m just not awake enough yet.

      Wtf proton what? What do people think Proton is saying and what’s the WTF part…?

      • BeMoreCareful@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        1 hour ago

        I don’t think the confusion has anything to do with networking. I’ve been puzzling over this post for a few minutes now… To be honest, I think I’m just more confused.

        Maybe this is some sort of AI battle of the wits or contagious stroke or something.

    • mlg@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      29 minutes ago

      is this saying you can still be fucked on public WiFi even if you connect through a VPN?

      The quick and dirty answer is no, unless an attacker can figure out a way to get your VPN to strip it’s encryption (doubt you’ll ever see this outside something like defcon but you never know lol).

      The long answer is that not all VPNs are equal depending on what you are trying to accomplish.

      A VPN will simply tunnel your internet traffic over an encrypted channel to a server anywhere in the world.

      On a technical level, this means that it will guarantee your internet traffic is unreadable until it hits the destination, which does mean it can make it more secure to use a public wifi/hotspot.

      Of course privacy is actually a massive security iceberg, so some caveats in no particular order are:

      spoiler
      • Modern protocols like HTTPS are already encrypted, although someone can still mess with stripping and poisoning techniques, so having a VPN running would be peace of mind.

      • Your privacy from companies like Google, Facebook, etc won’t be enforced by a VPN if you don’t also use a new browser session (incognito) because they can easily track your identity via cookies and accounts.

      • Even if you use a fresh session and dedicated VPN accounts, aforementioned tech companies can still identify you via statistical modeling based on your activity. They don’t really care what your IP is unless they need to pay tax for a country or follow some random media block law.

      • Your privacy from the government is nonexistent because most VPN companies will share your info if the government requests it.

      • Lots of VPNs choose to block torrenting so they don’t have to deal with protecting their customers (although lots also don’t).

      • Even if you setup your own VPN via a VPS in anonymous way, the government can still watch your exit traffic and link the origin back to you by inspecting the VPN packets (which is why Tor exists, a much different solution to the privacy problem).

      You should use a VPN if:

      • You want to torrent copyrighted material (yar har piracy)
      • You want to spoof your location to get access to geolocked content
      • You want to negate an attackers ability to mess with your connections on public WiFi
      • You want a secure channel between two of your own locations (make two separate networks accessible to eachother, or VPN to home/work to access resources on that network).
      • ^ same thing but remote access etc.

      You should not use a VPN if:

      • You need to hide what you do on the internet from the government (See Tor, journalists stuck in shithole regimes).
      • You want privacy from internet megacorps (you’d have to keep fresh sessions or use them sparingly which you can 90% do without a VPN anyway)
      • You want to hide anything after it reaches the VPN server (public VPN services, doesn’t apply if you VPN to something you physically own and access only its local resources).

      After all that, the use case basically becomes:

      • VPN to within your own country to secure your connection on public WiFi
      • VPN to home or work to access network
      • VPN with a good public service to other countries to watch or torrent media
    • ricecake@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      44 minutes ago

      Yes, to a degree. A VPN protects you from an attacker on the same WiFi network as you and that’s about it.

      Most assaults on your privacy don’t happen like that, and for the most part the attacks that do happen like that are stopped by the website using https and proper modern security.
      The benefit of the VPN is that it puts some of that protection under your control, but only as far as your VPN provider.

      A VPN is about as much protection from most cyber attacks as a gun is.

      They’re not a security tool, they’re a networking tool. They let you do some network stuff securely, and done correctly they can protect from some things, but the point of them is “this looks like a small, simple LAN, but it’s not”.

      It’s much easier to package and sell network tools than security tools, and they’re much more accepted by users, since security tools have a tendency to say “no” a lot, particularly when you might be doing something dumb,and users hate being told no, particularly when they’re doing something dumb.

    • WolfLink@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      11
      ·
      59 minutes ago

      There are some attacks you are vulnerable to on public WiFi that a VPN can help with.

      More generally, whoever is transporting your data knows who you are talking to. If you don’t use a VPN, your ISP and whoever owns the router know what websites you are visiting (although they don’t know the specific content). If you use a VPN, your ISP and router know you are using that VPN, but not what websites you are visiting. Now your VPN knows what websites you are visiting, but they still don’t know what the content is.

      I hope that helps.

  • Kokesh@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    15
    ·
    12 hours ago

    Also - using someone who got famous by describing sucking dick seems quite weird :) Who wants technical advice from her?

  • FarFarAway@lemmy.world
    link
    fedilink
    English
    arrow-up
    28
    ·
    9 hours ago

    Thank goodness someone explained that to me. I was startong to wonder if she was some sort of technology expert, or something.

  • 𝒎𝒂𝒏𝒊𝒆𝒍@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    3
    ·
    15 hours ago

    "It’s a prank bro"😅 but seriously as an IT guy I’m tired of pushing VPNs down our (collective) throats, not saying the threat isn’t real but it’s really overblown by the ads

  • Forester@yiffit.net
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    21
    ·
    18 hours ago

    The only effective antivirus program known to man is called a backup

    • qaz@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      12 hours ago

      How is this related to a VPN? Antivirus does nothing against a MITM attack.

      • Forester@yiffit.net
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        7
        ·
        10 hours ago

        Woosh

        I’m saying that no system is secure on a long enough timeframe . But that if you do get infected you can nuke and pave if you have a backup. Most of these VPN advertisers treat their product VPN like a magic shield / antivirus when it is In fact, nothing more than a fancy condom.

        • babybus@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          1
          ·
          edit-2
          10 hours ago

          VPN is not an anti-virus program. Also, you can’t really backup your online accounts and restore them in case they are hacked.

          • Forester@yiffit.net
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            3
            ·
            edit-2
            9 hours ago

            I am fully aware it’s not an antivirus program which is why I’m mocking people who pretend that they are. Just being on a virtual private Network does not protect you from man in the middle attacks. Sure it hardens your device against Wi-Fi eavesdropping. But you are still vulnerable to DNS spoofing session hijacking cache poisoning and SSL stripping. Aka a VPN won’t protect you from man in the middle attacks once you’ve entered a site app or network under someone else’s control.

            My day job is in web hosting.

  • RiQuY@lemm.ee
    link
    fedilink
    English
    arrow-up
    70
    arrow-down
    4
    ·
    11 hours ago

    I don’t understand why everyone assumes using a VPN means paying for a third party. I have Wireguard deployed in my NAS and I always have that VPN connection active on my phone to be able to access my LAN deployed services remotely, Jellyfin for example.

    • diffusive@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      11 hours ago

      My setup as well (plus encrypted DNS for good measure)

      I still have to somehow trust my ISP but I go down from having to trust my mobile ISP, my employer WiFi, random shops WiFi to just one ISP (that,fwiw, has shown to be transparent, customers friendly etc)

    • TORFdot0@lemmy.world
      link
      fedilink
      English
      arrow-up
      19
      ·
      6 hours ago

      Most VPNs sell themselves on encrypting your traffic to an endpoint that either is in a different locale to get around region locks or to put it out of the grasp of the RIAA so they can’t send your ISP copyright notices.

      While remote access to a local network is a good use case for a self-hosted VPN it’s totally unrelated to the use case for commercial VPNs

      • stephen01king@lemmy.zip
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        1
        ·
        6 hours ago

        For the use case of encrypting your traffic while using a public WiFi, both commercial VPNs and self-hosted ones provide the same functionality.

        • TORFdot0@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          6 hours ago

          Yes that’s true. But also that’s the wink and nudge marketing claim that VPN marketers make while everyone knows the real reason you are using a VPN.

          With HTTPS, DNS-over-HTTPS, and most endpoint firewalls dropping non-gateway traffic, the risk is a lot less than the VPN ad reads want you to believe

          • stephen01king@lemmy.zip
            link
            fedilink
            English
            arrow-up
            1
            ·
            3 hours ago

            DNS-over-HTTPS sounds like it’ll be the least used by general public since most people I know are still using default DNS settings which would point towards their ISP’s. I’m not sure how many ISPs have moved towards DNS-over-HTTPS or if they are even activated by default.

        • OR3X@lemm.ee
          link
          fedilink
          English
          arrow-up
          10
          ·
          5 hours ago

          I think the point they’re getting at Is that you can’t use a self-hosted vpn to hide your piracy activity because the link is registered to yourself.

          • stephen01king@lemmy.zip
            link
            fedilink
            English
            arrow-up
            4
            arrow-down
            1
            ·
            3 hours ago

            Yes, but this thread is about security while using public Wi-Fi, which the original comment was saying doesn’t require commercial VPNs.

    • arthurpizza@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      7 hours ago

      It’s also worth mentioning that the VPN in question, Proton, offers one of the best free tiers of any VPN company.

    • Randelung@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 hours ago

      I do the same, but it’s very clear that when people talk about “a VPN” they’re referring to a commercial cloud hosted product.

    • s_s@lemm.ee
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 hour ago

      I don’t understand why everyone assumes using a VPN means paying for a third party.

      It’s because that is what is advertised to them.

    • Praise Idleness@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      17
      ·
      10 hours ago

      For less technical people or just don’t want to deal with public-facing open port: Tailscale or Zerotier are both great option (use Tailscale if former)!

      • floquant@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        8
        ·
        10 hours ago

        Since Wireguard uses UDP and peers only reply to a received packet if it’s expected and valid, it won’t show up in port scans and barely increases your attack surface. Tailscale and Zerotier are quite nice, but personally I dislike NAT-punching protocols.

      • tfw_no_toiletpaper@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        5 hours ago

        I use tailscale for hosting gameservers for friends and the occasional watch together on jellyfin. Kinda scuffed setup with one burner github account for login. And ~10 devices connected to that network. So I need to authenticate every device myself (at the beginning and sporadically) but I don’t need to pay Tailscale for adding multiple accounts to the network.

        At the beginning I tried to do set up everything with my own wireguard server. I only have a public v6 IP, so some of my friends connected without problems and for some it would not work. After I think 3h helping them in their router settings I just gave up. I looked up if I could rent a service somewhere that gives me a public Ipv4 relay, found Tailscale instead and stopped looking for something else haha. Sometimes it’s not worth the effort.

      • kameecoding@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        7 hours ago

        I am technical, I decided to just not open up any port that’s not needed for Plex and Jellyfin, sometimes it would be nice to access radarr and sonarr remotely, but fuck I just don’t want to deal with the setup

    • mat@linux.community
      link
      fedilink
      English
      arrow-up
      4
      ·
      7 hours ago

      I tried setting this up, and I can connect to my honeserver, but I’ve no idea how to access its LAN services. How does it work?

      • Zanathos@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        7 hours ago

        Do you have internal DNS set up? I have my wire guard deployed on both of my pihole servers, which have local DNS entries for my internal services, which point back to my internal Traefik container for NAT translations. I know that sounds a bit complicated, but that’s how it works for my environment.

        • mat@linux.community
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 minutes ago

          Wow yeah, that’s way more than what I have haha. So I guess I need to look into DNS…

  • Draedron@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    25
    ·
    10 hours ago

    Dude is completely right. VPNs are good against geoblocking but thats it. All VPN providers that claim not to log stuff are lying and if there are logs it doesnt make a difference privacy wise

    • Zozano@lemy.lol
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      6 hours ago

      You know, from a business standpoint, it makes financial sense NOT to log user traffic.

      Reason one: plausible deniability. You can’t give what you don’t have.

      Reason two: storage. Why the fuck would you keep logs, when it costs money to?

      Reason three: these boots taste fantastic! (People generally don’t enjoy licking boots).