Win / Conspiracies
Conspiracies
Communities Topics Log In Sign Up
Sign In
Hot
All Posts
Settings
All
Profile
Saved
Upvoted
Hidden
Messages

Your Communities

General
AskWin
Funny
Technology
Animals
Sports
Gaming
DIY
Health
Positive
Privacy
News
Changelogs

More Communities

frenworld
OhTwitter
MillionDollarExtreme
NoNewNormal
Ladies
Conspiracies
GreatAwakening
IP2Always
GameDev
ParallelSociety
Privacy Policy
Terms of Service
Content Policy
DEFAULT COMMUNITIES • All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Conspiracies Conspiracy Theories & Facts
hot new rising top

Sign In or Create an Account

23
posted 3 years ago by xihg 3 years ago by xihg +25 / -2
54 comments share
54 comments share save hide report block hide replies
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (54)
sorted by:
▲ 1 ▼
– HonestTruth 1 point 3 years ago +1 / -0

It is all part of the internet of things, which is easily and tightly controlled. Any exchange points or interfaces are easily caught, the capability for a user to operate standalone with other users can be diminished in many ways.

So, as long as it is not facing this type of control over it and remains free as it is, you are correct.

permalink parent save report block reply
▲ 1 ▼
– CoolAsACucumber 1 point 3 years ago +1 / -0

You have no idea what you're talking about.

If you use the right kind of VPN where the account is made with no identifying info, that shields you from being monitored. If you pay for that VPN with crypto like say Monero or after buying bitcoin from a person with cash and putting it in a new wallet, that shields you. As long as you're on a VPN in an area that is frequently used by many people, that shields you.

You pay for things with you're Bitcoin and teach people around you how to trade securely with a new wallet and handing cash to people, that shields you. The Fed doesn't have the resources to monitor a million pseudononymous wallets that never move to a KYC exchange.

permalink parent save report block reply
▲ 2 ▼
– HonestTruth 2 points 3 years ago +2 / -0

So let me get this straight. Your grab your digital device, connect it to the internet via your ISP using your credentials, then using your credentials you sign into your VPN, which protects you. And now you can easily exchange using the methods you prefer sight unseen.

Personally, I think your head is in the clouds on how this stuff works.

permalink parent save report block reply
▲ 1 ▼
– CoolAsACucumber 1 point 3 years ago +1 / -0

No, a wallet doesn't have to be digital. If you use a hardware wallet you connect it to a computer. Hardware wallets are great because you can put in the passphrase on the hardware wallet and not the computer which prevents keyloggers.

Also an ISP can't monitor where you are on a VPN, all they know is you are connected to a VPN server. If I sign up for a VPN account on one IP address and then use that VPN on a different computer and devices with a different IP address, then it's not easily tracked. If I'm connected to a server that has a lot of people connected to it, my traffic gets mixed in with theirs. If I convince many people around me to adopt the same practices and they convince others as well, pinpointing me gets even murkier.

permalink parent save report block reply
▲ 2 ▼
– HonestTruth 2 points 3 years ago +2 / -0

Everything is packetized and streamed via your isp, nuff said.

In your safe world there is no problem, but when there is a desire to control things they get controlled. Currently this is a tool under heavy manipulation and time can bring it in many directions.

permalink parent save report block reply
▲ 0 ▼
– MindlessRationality 0 points 3 years ago +1 / -1

VPNs are not protection from anything....think about how you send data to the VPN.

As mentioned by the other user, the ISP is the messenger....so it can see what you send...they can also intercept the keys for a SSL transfer....since you need to exchange the data, and could spoof it if they have a copy of a root certificate....which pretty sure the government can get access to from all major ones....so then you have a bunch of government regions who oversee the ISPs.....and they can put in a tap ... Like the old days of wiretapping...they just put in the central datacenter and if that doesnt work....they go after the hardware switches......

Everything ultimately relies on the trust being established with the VPN before it can offer any security. That connection point is the dangerous time...that point is where it can occur....also it depends on the VPN also being secured after that.

Since the ISP controls the process, the only way would be to have a ZKP or OTP which would then require that you need to have a another means of getting that info transfered to you to avoid the ISP again.

Its hard....trusting a VPN is not the way.... especially when a lot billionaire ex military intelligence run them......

permalink parent save report block reply

GIFs

Conspiracies Wiki & Links

Conspiracies Book List

External Digital Book Libraries

Mod Logs

Honor Roll

Conspiracies.win: This is a forum for free thinking and for discussing issues which have captured your imagination. Please respect other views and opinions, and keep an open mind. Our goal is to create a fairer and more transparent world for a better future.

Community Rules: <click this link for a detailed explanation of the rules

Rule 1: Be respectful. Attack the argument, not the person.

Rule 2: Don't abuse the report function.

Rule 3: No excessive, unnecessary and/or bullying "meta" posts.

To prevent SPAM, posts from accounts younger than 4 days old, and/or with <50 points, wont appear in the feed until approved by a mod.

Disclaimer: Submissions/comments of exceptionally low quality, trolling, stalking, spam, and those submissions/comments determined to be intentionally misleading, calls to violence and/or abuse of other users here, may all be removed at moderator's discretion.

Moderators

  • Doggos
  • axolotl_peyotl
  • trinadin
  • PutinLovesCats
  • clemaneuverers
  • C
Message the Moderators

Terms of Service | Privacy Policy

2025.03.01 - j6rsh (status)

Copyright © 2024.

Terms of Service | Privacy Policy