• @sugar_in_your_tea@sh.itjust.works
    link
    fedilink
    English
    92 months ago

    There are plenty of legitimate uses for their services, they just aren’t things that the vast majority of people actually need. For example:

    • access things in a LAN from a WAN - i.e. access a personal PC when you’re at a friend’s house, and your home LAN is behind CGNAT
    • get around local laws - e.g. my state requires ID checks for porn and social media, so getting a VPN one state over gets around that
    • prevent ISP from seeing the sites you visit - very valid privacy concern, especially since SNI exists to de-mask TLS packets

    There are also some sketchier needs, such as:

    • get different content on your streaming platform
    • hide sharing of illegal content (i.e. piracy)
    • perform illegal transactions (e.g. going on Tor to buy drugs or whatever on the black market)

    I think VPNs are trying to appeal to more than just the above needs, they’re trying to create needs to grow their marketshare. That isn’t something a reputable VPN should do, or at least that’s something that would make me hesitate to use a given VPN.

    • @PriorityMotif@lemmy.world
      link
      fedilink
      English
      72 months ago

      If you want to give an anonymous video to the press or the police. If you don’t hide your ip then it isn’t anonymous and they’ll come question you.

    • @uid0gid0@lemmy.world
      link
      fedilink
      English
      12 months ago

      The only thing you need to say is “my ISP uses CGNAT” you can’t host anything or run games for your friends without a way to punch through the CGNAT layer. I mean you could use IPv6 if it weren’t still a joke in the US but here we are.

      • @sugar_in_your_tea@sh.itjust.works
        link
        fedilink
        English
        12 months ago

        Yup, CGNAT sucks. But STUN works fine for me, and most games support it, so it’s not a huge issue.

        I could pay extra for a public IP, but for the same price I can get a VPS and do other cool stuff, so I just went the WireGuard VPN route. Same end result with a little more latency, but also more flexibility. I host a few static sites directly on the VPS, with everything else going through the VPN, so that’s nice.

    • @dan@upvote.au
      link
      fedilink
      English
      12 months ago

      get around local laws

      That’s not a legitimate use; it’s an illegal use just like piracy is.

      especially since SNI exists to de-mask TLS packets

      ECH will finally fix this. https://blog.cloudflare.com/encrypted-client-hello/

      SNI is still better than what we used to have. Before SNI, every site that used TLS or SSL had to have a dedicated IP address.

      • @sugar_in_your_tea@sh.itjust.works
        link
        fedilink
        English
        12 months ago

        That’s not a legitimate use; it’s an illegal use just like piracy is.

        My understanding of the law (and yes, I read it) is that it’s not illegal. The law in my state is for service providers to authenticate the ID of any state resident, it’s not a requirement on the resident themselves. The service provider isn’t aware what state I’m a resident of, and state law doesn’t apply outside the state, so I don’t know what law would be violated here.

        SNI is still better than what we used to have.

        I absolutely agree, and I actually use SNI to route packets for my homelab. Without SNI, I would have to route after handling certificates, which would be annoying because I want TLS to work within my home network, and I mess w/ DNS records to point to my local IPs when inside my network. I could have everything routed through a central hub (so one dedicated machine that handles all TLS), but that’s a single point of failure, and I’m not too happy about that. Or I guess I’d have multiple IPs, and route based on which IP is being hit.

        I’ll have to check out ECH. Hopefully I can eat my cake and have it too.