So let me get this straight.
Your grab your digital device, connect it to the internet via your ISP using your credentials, then using your credentials you sign into your VPN, which protects you.
And now you can easily exchange using the methods you prefer sight unseen.
Personally, I think your head is in the clouds on how this stuff works.
No, a wallet doesn't have to be digital. If you use a hardware wallet you connect it to a computer. Hardware wallets are great because you can put in the passphrase on the hardware wallet and not the computer which prevents keyloggers.
Also an ISP can't monitor where you are on a VPN, all they know is you are connected to a VPN server. If I sign up for a VPN account on one IP address and then use that VPN on a different computer and devices with a different IP address, then it's not easily tracked. If I'm connected to a server that has a lot of people connected to it, my traffic gets mixed in with theirs. If I convince many people around me to adopt the same practices and they convince others as well, pinpointing me gets even murkier.
Everything is packetized and streamed via your isp, nuff said.
In your safe world there is no problem, but when there is a desire to control things they get controlled. Currently this is a tool under heavy manipulation and time can bring it in many directions.
VPNs are not protection from anything....think about how you send data to the VPN.
As mentioned by the other user, the ISP is the messenger....so it can see what you send...they can also intercept the keys for a SSL transfer....since you need to exchange the data, and could spoof it if they have a copy of a root certificate....which pretty sure the government can get access to from all major ones....so then you have a bunch of government regions who oversee the ISPs.....and they can put in a tap ... Like the old days of wiretapping...they just put in the central datacenter and if that doesnt work....they go after the hardware switches......
Everything ultimately relies on the trust being established with the VPN before it can offer any security. That connection point is the dangerous time...that point is where it can occur....also it depends on the VPN also being secured after that.
Since the ISP controls the process, the only way would be to have a ZKP or OTP which would then require that you need to have a another means of getting that info transfered to you to avoid the ISP again.
Its hard....trusting a VPN is not the way.... especially when a lot billionaire ex military intelligence run them......
So let me get this straight. Your grab your digital device, connect it to the internet via your ISP using your credentials, then using your credentials you sign into your VPN, which protects you. And now you can easily exchange using the methods you prefer sight unseen.
Personally, I think your head is in the clouds on how this stuff works.
No, a wallet doesn't have to be digital. If you use a hardware wallet you connect it to a computer. Hardware wallets are great because you can put in the passphrase on the hardware wallet and not the computer which prevents keyloggers.
Also an ISP can't monitor where you are on a VPN, all they know is you are connected to a VPN server. If I sign up for a VPN account on one IP address and then use that VPN on a different computer and devices with a different IP address, then it's not easily tracked. If I'm connected to a server that has a lot of people connected to it, my traffic gets mixed in with theirs. If I convince many people around me to adopt the same practices and they convince others as well, pinpointing me gets even murkier.
Everything is packetized and streamed via your isp, nuff said.
In your safe world there is no problem, but when there is a desire to control things they get controlled. Currently this is a tool under heavy manipulation and time can bring it in many directions.
VPNs are not protection from anything....think about how you send data to the VPN.
As mentioned by the other user, the ISP is the messenger....so it can see what you send...they can also intercept the keys for a SSL transfer....since you need to exchange the data, and could spoof it if they have a copy of a root certificate....which pretty sure the government can get access to from all major ones....so then you have a bunch of government regions who oversee the ISPs.....and they can put in a tap ... Like the old days of wiretapping...they just put in the central datacenter and if that doesnt work....they go after the hardware switches......
Everything ultimately relies on the trust being established with the VPN before it can offer any security. That connection point is the dangerous time...that point is where it can occur....also it depends on the VPN also being secured after that.
Since the ISP controls the process, the only way would be to have a ZKP or OTP which would then require that you need to have a another means of getting that info transfered to you to avoid the ISP again.
Its hard....trusting a VPN is not the way.... especially when a lot billionaire ex military intelligence run them......