• EmperorHenry
    link
    fedilink
    arrow-up
    12
    arrow-down
    4
    ·
    2 months ago

    Use Mullvad, iVPN or Proton and they really won’t see what you’re doing

    with Mullvad and iVPN, be sure to use the quantum encryption. And to help obscure your traffic with proton, be sure to use a proxy that has around 50% to 60% usage. That way anyone who tries to use a quantum computer to break the encryption on a proton VPN proxy is going to see everyone else’s traffic using that proxy as well as you. There would be a lot of shit to go through even if they use a quantum computer.

    • p1mrx@sh.itjust.works
      link
      fedilink
      arrow-up
      4
      ·
      2 months ago

      So your threat model assumes an actor with a quantum computer capable of breaking RSA, but not a regular computer capable of filtering by IP address?

      • EmperorHenry
        link
        fedilink
        arrow-up
        2
        ·
        2 months ago

        filtering by IP address how?

        the IP address of your modem? Well your ISP will easily be able to tell whether or not you’re using a VPN. And I guess at that level if someone used a quantum computer on your modem’s connection from the modem to the proxy, then yeah, they’d probably be able to evesdrop as long as they have access to the lines from your house to the hub of your local ISP and the VPN you’re using doesn’t have quantum-safe encryption.

        If you’re in a position where you’d need to worry about a corporation or government using a quantum computer to get into your shit you’ve got bigger problems.

        From what I understand, it requires a fuck-ton of electricity to run a quantum PC and they’d need to use even more electricity on top of that to keep it cool in a refrigerated room at sub-zero temperatures.

        But that’s only what all the tech-companies making them are currently saying. There’s probably more advanced stuff that they’re keeping secret. We’ll never know until another whistleblower sacrifices their entire life to tell the world about it.

        • p1mrx@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          ·
          2 months ago

          A VPN encrypts traffic between your device and the VPN server, and any packet on that path includes your IP address. So anyone attempting to decrypt your VPN traffic can trivially distinguish your packets from other users of the VPN server.

    • You999@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      2 months ago

      A VPN is only a single end point just like your ISP meaning you are only shifting the problem to your VPN provider who admittedly is more trustworthy than your ISP but you are still putting an immense amount of trust into a single point of failure.

      If you truly want to hide from your ISP or really anyone, your only options are to use TOR or I2P where your traffic is encrypted and tumbled through multiple servers.

    • neutronst4r@beehaw.org
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      2 months ago

      Absolutely no one is using quantum computers to brute force encryption, stop the fear mongering.