Voyager@psychedelia.ink to Technology@lemmy.worldEnglish · 1 year agoWe have successfully completed our migration to RAM-only VPN infrastructure - Mullvad VPNmullvad.netexternal-linkmessage-square93fedilinkarrow-up1790arrow-down18cross-posted to: technology@lemmy.mlhackernews@lemmy.smeargle.fanshackernews@derp.fooprivacy@lemmy.ml
arrow-up1782arrow-down1external-linkWe have successfully completed our migration to RAM-only VPN infrastructure - Mullvad VPNmullvad.netVoyager@psychedelia.ink to Technology@lemmy.worldEnglish · 1 year agomessage-square93fedilinkcross-posted to: technology@lemmy.mlhackernews@lemmy.smeargle.fanshackernews@derp.fooprivacy@lemmy.ml
minus-squaresebschlinkfedilinkEnglisharrow-up3·1 year agoBut why would logs you hurt than? How to debug and how to do forensic if only the supposed persons are connected to your home, if you don’t have any logs?
minus-squarejarfil@lemmy.worldlinkfedilinkEnglisharrow-up2·1 year agoVPNs prevent your origin ISP from keeping logs; you may not want your office, school, coffee shop, city wifi, etc. to know which services you’re accessing. You can (should) still require identification on your home hosted services, you can log that.
But why would logs you hurt than?
How to debug and how to do forensic if only the supposed persons are connected to your home, if you don’t have any logs?
VPNs prevent your origin ISP from keeping logs; you may not want your office, school, coffee shop, city wifi, etc. to know which services you’re accessing.
You can (should) still require identification on your home hosted services, you can log that.