chucker23n1
macrumors G3
As for evaluating whether you can trust the entity running the VPN endpoint, do you honestly think the general public is equipped to do that?
They aren't, but that's a whole different discussion.
As for evaluating whether you can trust the entity running the VPN endpoint, do you honestly think the general public is equipped to do that?
Is there something that supports that generalized theory?Yes, for a tiny fraction of the population with specific needs and deep knowledge of the tradeoffs, a VPN service can be legitimately useful.
And again, for the overwhelming majority (on the order of 99%) of the people who think they need a VPN, it actually reduces security and privacy.
No, it isn't. The point twistedpixel8 made, and with which I agree, is that this feature is misleading and should be removed. Things should not be marketed towards the general public if the general public is not capable of usefully evaluating whether they will do what is claimed. That is the entire reason "snake oil" is in the common lexicon.They aren't, but that's a whole different discussion.
No, it isn't. The point twistedpixel8 made, and with which I agree, is that this feature is misleading and should be removed. Things should not be marketed towards the general public if the general public is not capable of usefully evaluating whether they will do what is claimed. That is the entire reason "snake oil" is in the common lexicon.
Correct, it has nothing to do with VPNs directly. I brought VPNs up because they are in a similar situation: a neat, makes-you-feel-like-a-hacker feature which doesn't actually perform the advertised function.What? This feature has nothing to do with VPNs.
And no, that's not even what snake oil is. Snake oil (as used in common parlance) does nothing. VPNs do plenty.
Correct, it has nothing to do with VPNs directly. I brought VPNs up because they are in a similar situation: a neat, makes-you-feel-like-a-hacker feature which doesn't actually perform the advertised function.
And now VPNs in general are "actively harmful" to the "overwhelming majority".Correct, it has nothing to do with VPNs directly. I brought VPNs up because they are in a similar situation: a neat, makes-you-feel-like-a-hacker feature which doesn't actually perform the advertised function.
VPNs help a tiny number of people. Again, for the overwhelming majority, they are actively harmful.
I'm done with this. Read what any person significant in either the cryptography or broader infosec communities has said about VPN marketing to the general public.
The first law of encryption is to assume that everything you write/type/record/encode on any device is public knowledge and also know that who you communicate with is as revealing as what you say.And now VPNs in general are "actively harmful" to the "overwhelming majority".
So what's the point of any of then?The first law of encryption is to assume that everything you write/type/record/encode on any device is public knowledge and also know that who you communicate with is as revealing as what you say.
99.999% of the time, no point whatsoever.So what's the point of any of then?
Well, sounds like there isn't a point to locks either since someone somewhere can certainly pick whatever one you might use.99.999% of the time, no point whatsoever.
Either the content is not worth encoding or it is being monitored by people more sophisticated in breaking the cypher than you are at encoding it. The "one time pad" is still the only unbreakable encryption method but, since it relies upon distributing multiple copies of the pad (to the sender and recipient(s)), it isn't secure either.
You can defend yourself against thieves who come to you and attack your locks, even if the locks fail. When you broadcast an encoded text across the world, you don't know who is listening for it, decoding it, tracking it (forwards or backwards), copying it, storing it, altering it, etc. You'll never know if you've been broken intoWell, sounds like there isn't a point to locks either since someone somewhere can certainly pick whatever one you might use.