Re: Anonymous Me (or... How I used VPN to Hide the Real Me)
A conspiratorial analysis of Bruce's list of service claims:
"1. We absolutely do not log any traffic nor session data of any kind, period. "
Believe this is you will. I simply don't. Wrapped up in such statements is always definition of terminology. What does "Session data" actually mean? Whose definition of "session data" is being used here. The need to state specifically "traffic or session data" rather than saying "we do not log ANY data at all" is suggestive that something else is being logged.
"2. We operate out of the US . . . "
Oh dear ! The snoop capital of the world !! This is laughable imo. Where shall I hide my data hmmm let me think, Outer Mongolia? The Outer Hebrides? A small islet in the middle of the Pacific? . . . . Oh I know. . . The USA ! Yeah that'll be safe !
"We severely scrutinize the validity of any and all legal information requests. "
Really? So you don't just route traffic through your infrastructure indiscriminately then? You are actually scrutinizing it in some way ? How do you determine a legal request from an illegal request? What kind of scrutiny is involved here?
"3. We do not monitor any traffic, period. We block IPs/ports as needed to mitigate abuse when we receive a valid abuse notification."
Hmm ok so you ARE looking at IPs and ports. So you know my IP then and that of everyone using your service. I wonder how you are able to verify a valid abuse notification from a non-valid one. You must be looking at something !
"4. . . we’re unable to identify any users of our service."
Pretty sure this contradicts item 3. An IP address is identification. Also, if this is a paid for service then you MUST be able to identify who your customers are otherwise anyone could use the service without paying. Thus there must exist some user authentication (login/password) which I have to assume gets linked to the IP address and/or the traffic being sent/received.
"5. Once again, we do not log any traffic or session data."
Yep but you are clearly logging something. Why not say what you DO log rather than what you don't?
"For this reason, we’re unable to identify any user of our service.
As above, nonsense. Otherwise anyone could use it.
"6. We do not discriminate against any kind of traffic/protocol on any of our servers, period. We believe in a free, open, and uncensored internet."
Well, except if there is a valid abuse notification then we do actually have the ability to block specific IPs/ports even though we're not monitoring anything of course , and we can't see those IP addresses, or the ports because we can't identify anyone using our service. Actually the whole thing is done by magic . . . it's really cool actually !
"8. We’re the only provider to date that provides a plethora of encryption cipher options. We recommend, mostly, using AES-128, SHA1 and RSA2048. "
Yes please use one of the standard encryption algorithms because it's then so much easier for the powers that be to decrypt the traffic. They have super computers running gazillions of MIPS (Millions of Instructions Per Second) which can crack these encryptions in no time. It's really not rocket science. We've been breaking codes since the 2nd World War you know !
Summary - Not convinced
.
.
.
in the least!