It is all part of the internet of things, which is easily and tightly controlled.
Any exchange points or interfaces are easily caught, the capability for a user to operate standalone with other users can be diminished in many ways.
So, as long as it is not facing this type of control over it and remains free as it is, you are correct.
If you use the right kind of VPN where the account is made with no identifying info, that shields you from being monitored. If you pay for that VPN with crypto like say Monero or after buying bitcoin from a person with cash and putting it in a new wallet, that shields you. As long as you're on a VPN in an area that is frequently used by many people, that shields you.
You pay for things with you're Bitcoin and teach people around you how to trade securely with a new wallet and handing cash to people, that shields you. The Fed doesn't have the resources to monitor a million pseudononymous wallets that never move to a KYC exchange.
So let me get this straight.
Your grab your digital device, connect it to the internet via your ISP using your credentials, then using your credentials you sign into your VPN, which protects you.
And now you can easily exchange using the methods you prefer sight unseen.
Personally, I think your head is in the clouds on how this stuff works.
No, a wallet doesn't have to be digital. If you use a hardware wallet you connect it to a computer. Hardware wallets are great because you can put in the passphrase on the hardware wallet and not the computer which prevents keyloggers.
Also an ISP can't monitor where you are on a VPN, all they know is you are connected to a VPN server. If I sign up for a VPN account on one IP address and then use that VPN on a different computer and devices with a different IP address, then it's not easily tracked. If I'm connected to a server that has a lot of people connected to it, my traffic gets mixed in with theirs. If I convince many people around me to adopt the same practices and they convince others as well, pinpointing me gets even murkier.
Everything is packetized and streamed via your isp, nuff said.
In your safe world there is no problem, but when there is a desire to control things they get controlled. Currently this is a tool under heavy manipulation and time can bring it in many directions.
VPNs are not protection from anything....think about how you send data to the VPN.
As mentioned by the other user, the ISP is the messenger....so it can see what you send...they can also intercept the keys for a SSL transfer....since you need to exchange the data, and could spoof it if they have a copy of a root certificate....which pretty sure the government can get access to from all major ones....so then you have a bunch of government regions who oversee the ISPs.....and they can put in a tap ... Like the old days of wiretapping...they just put in the central datacenter and if that doesnt work....they go after the hardware switches......
Everything ultimately relies on the trust being established with the VPN before it can offer any security. That connection point is the dangerous time...that point is where it can occur....also it depends on the VPN also being secured after that.
Since the ISP controls the process, the only way would be to have a ZKP or OTP which would then require that you need to have a another means of getting that info transfered to you to avoid the ISP again.
Its hard....trusting a VPN is not the way.... especially when a lot billionaire ex military intelligence run them......
It is all part of the internet of things, which is easily and tightly controlled. Any exchange points or interfaces are easily caught, the capability for a user to operate standalone with other users can be diminished in many ways.
So, as long as it is not facing this type of control over it and remains free as it is, you are correct.
You have no idea what you're talking about.
If you use the right kind of VPN where the account is made with no identifying info, that shields you from being monitored. If you pay for that VPN with crypto like say Monero or after buying bitcoin from a person with cash and putting it in a new wallet, that shields you. As long as you're on a VPN in an area that is frequently used by many people, that shields you.
You pay for things with you're Bitcoin and teach people around you how to trade securely with a new wallet and handing cash to people, that shields you. The Fed doesn't have the resources to monitor a million pseudononymous wallets that never move to a KYC exchange.
So let me get this straight. Your grab your digital device, connect it to the internet via your ISP using your credentials, then using your credentials you sign into your VPN, which protects you. And now you can easily exchange using the methods you prefer sight unseen.
Personally, I think your head is in the clouds on how this stuff works.
No, a wallet doesn't have to be digital. If you use a hardware wallet you connect it to a computer. Hardware wallets are great because you can put in the passphrase on the hardware wallet and not the computer which prevents keyloggers.
Also an ISP can't monitor where you are on a VPN, all they know is you are connected to a VPN server. If I sign up for a VPN account on one IP address and then use that VPN on a different computer and devices with a different IP address, then it's not easily tracked. If I'm connected to a server that has a lot of people connected to it, my traffic gets mixed in with theirs. If I convince many people around me to adopt the same practices and they convince others as well, pinpointing me gets even murkier.
Everything is packetized and streamed via your isp, nuff said.
In your safe world there is no problem, but when there is a desire to control things they get controlled. Currently this is a tool under heavy manipulation and time can bring it in many directions.
VPNs are not protection from anything....think about how you send data to the VPN.
As mentioned by the other user, the ISP is the messenger....so it can see what you send...they can also intercept the keys for a SSL transfer....since you need to exchange the data, and could spoof it if they have a copy of a root certificate....which pretty sure the government can get access to from all major ones....so then you have a bunch of government regions who oversee the ISPs.....and they can put in a tap ... Like the old days of wiretapping...they just put in the central datacenter and if that doesnt work....they go after the hardware switches......
Everything ultimately relies on the trust being established with the VPN before it can offer any security. That connection point is the dangerous time...that point is where it can occur....also it depends on the VPN also being secured after that.
Since the ISP controls the process, the only way would be to have a ZKP or OTP which would then require that you need to have a another means of getting that info transfered to you to avoid the ISP again.
Its hard....trusting a VPN is not the way.... especially when a lot billionaire ex military intelligence run them......