You sure you trust VPN providers? Would it not be better to make your own VPN?
Chapters
- 0:00- Quick overview of WireGuard
- 01:41- WireGuard VPN setup // Choosing a Linode Plan
- 02:49- SSH to the Linode server
- 03:46- Updating and upgrading server
- 04:25- Installing WireGuard
- 05:05- Hiding your WireGuard private key
- 07:03- Adding a new WireGuard interface
- 10:14- Setting up WireGuard on a Client computer
- 15:08- Disabling IPv6
- 18:35- Setting up NAT
- 21:28- WireGuard installation summary
- 22:24- Setting up persistence for WireGuard
- 26:33- Create another SSH user
- 30:11- Remove root SSH access
- 34:00- Reasons to use WireGuard
- 36:30- Conclusion
That video makes no sense
A peer-to-peer VPN would be nice, with invites. Only secure if you use HTTPS only, as you would need to trust random people. But you would always have endpoints on residential IPs, meaning block resistance.
Isn’t that juat tor?
True kinda. But if the network was between people who know each other a bit, it could make running an “exit node” more safe
Stop trusting VPS providers! Run your own servers at home!
Unless you infiltrate someone else’s network, the endpoint your basic VPN connects to can always be traced back to you.
So, either you trust a VPN company doesn’t hold logs and try to hide within all the other traffic.
Or you host your own VPN on a VPS knowing you haven’t set up any logging (and hope that your VPS hasn’t been tampered with), but then have a static IP that comes back to your identity.If your goal is to truly obfuscate and anonymous, this will not work as any endpoint you run can be easily tied back to you.