so you actively review it but dont log it?
How do you expect to log in to a VPN server without your real IP being exposed
I don’t expect my real IP not to be exposed to the VPN server, I’m an IT guy and I do know how things work, I expected their VPN server to know my real IP, but the thing you don’t know is if they do logged your IP or not.
No logs is certainly a thing with Protonmail. Tried and tested here on multiple fronts and never been let down once.If you can trust anyone with your personal data, it’s these guys.
Can you prove what you just said? Have you done something really nasty enough for them to taking action? I just did something nasty, not with ProtonMail but ProtonVPN and they somehow know it’s me who did that, I’m not talking about ProtonMail here so your argument is invalid.
It’s just likely not common practice to USE those logs
So you’re saying that they’re stashing logs but simply don’t use it? Sure, I’m gonna to write down all of your messages, your nudes, your bank account creds but I simply won’t use it for anything, you can trust me, right?
>Fires a nuke at a CERN server>Expects to get away with it because “no logs”
I don’t nuke their server and I don’t want to nuke their server, if I nuke their server that would take me nowhere.
I used their server to annoy the whole internet and I do expect to get away with it, it will not cause any damage but surely will get a lot of network get pissed off and will blame the origin IP that has poked them. If they really and truly don’t keep log/monitoring their server then they will have no way of knowing who has use their server to do this.
This post has EXACTLY the opposite effect from what you intended I’m sure.
What’s my intention again?
No logs is certainly a thing with Protonmail.
That’s totally different, websites can just check a DB and see if your IP is residential or not.
After they admit that they monitor the network, did I said them logging anymore? The original post are before they said they do the network monitoring.
But whatever the kind of it, they’re similar anyway, you don’t know how log they’ve been “analysis” it, even though it will not save the log file but data still leak out of its pipe.
Did I? They’ve reply me and tell that they did have something from my VPN session other than “timestamp”
I’ve been wondering why there’s a massive FUD campaign going on against Proton. Here’s a big clue; > ProtonVPN (operated from Switzerland) claims[1]: "Our security team has also i... | Hacker News . Also there’s a discussion on Wilders, starting at comment #52 Anyone using ProtonMail? | Page 3 | Wilders Security Forums .
I could assure you this is 100% real, you don’t have to believe me but you can do it yourself, I’ve written a very detailed tutorial on what you need to do to replicate it. I’d recommend you to create a free account and do the scanning, otherwise you’ll lose your subscription with your money in it, well I guess you’ll learn a thing or two if you did lose your subscription, wanna bet?
-
What’s your problem with brand new account with no post history again?
-
Nord and PIA are really doing a good job at it.
-
I agree on that they’re very noisy, how else could you do to get their attention if you don’t being noisy? Just regular customer doing YouTube and Facebook will not do anything to bother them, just like what PureVPN does until they finally break their promise. That noisy does really bother them enough for them to taking action.
Why did my account get banned? Could any staff explain this if you really don’t know what’s going on with my account?
The only information we keep about the user is a single login timestamp which only contains the username and time when user logged in his/her account
This is a timestamp of a login attempt, it does not contain any other information (for example user IP address) and it’s main purpose is to protect our users’ accounts from brute force. As we state in Privacy Policy, the timestamp is overwritten each time you connect to a server.
Hey Andrew, when you connect to a server, we log save a timestamp of that event and no IP information.
I’m pretty sure that you can’t figure out who sent the traffic ONLY with that information.
You could say that they’ve sold me out to protect their server.
Hey, wwwencrypt, just a quick heads-up:
happend is actually spelled happened. You can remember it by ends with -ened.
Have a nice day!
^^^^The ^^^^parent ^^^^commenter ^^^^can ^^^^reply ^^^^with ^^^^‘delete’ ^^^^to ^^^^delete ^^^^this ^^^^comment.
And which one do you use? I recently bought the proton plus.
Please create your own topic instead of answering 4+ years old ones. To answer your question, traffic is obviously encrypted but you don’t need to break encryption to see e.g DDoS attacks. Also there are no logfiles written.
Well how would they know what you are doing? Cause from my understanding of VPN service (which is very little, just what I read from their website)is that VPN service are not supposed to be able to tell what you are doing on the Internet what so ever according to their own advertisement. And that your ISP is Not supposed to either since as they advertise when your connected to a VPN service then no one not even your ISP can see what your doing on the Internet and since we (VPN service) don’t keep Any logs there’s absolutely nothing we can see or give to anyone who requests your logs. Because we don’t keep anything on your activities to give them. Okay so now everyone here is stating that they are able to get everything your doing on the Internet. So what the hell use of a VPN service is good for then???
The problem is we don’t know if it is your server or not. So you can clearly see the problem that this poses for us. If we allow this type of activity to take place entirely without limitation, it will not take long for all providers to ban ProtonVPN IPs. So while it is not really ideal, the alternative is worse.
Just to spare everybody else the reading, your question is essentially, how can we detect that you are breaking ProtonVPN Terms and Conditions without logging.
It is quite simple actually. When our systems team is informed about abuse originating from a VPN server, we check the network traffic on the server in question in realtime to verify the abuse report. If we see a VPN connection engaged in abusive behavior when we check, we find the userid associated with that connection and terminate the account.
First off with regards to the “something nasty”, as unlikely as it is I believe I might be responsible for the DDoS attacks getting launched on Proton VPN recently, as a lot of the people I fuck with for a laugh are more than capable of taking on such a high value target. And its what I use as a VPN on Linux usually so its practically impenetrable when your port rules are right.
So if completely destroying everyones VPN experience counts, then I think so. Not to mention I fire HTTP redirect botnets in my own DDoS attempts quite frequently. Remember the servers are not supposed to be for hacking, they are supposed to be for privacy, however unfortunately due to the Tap Proton VPN vulnerability that allows remote file inclusion on the memory of the target Windows Machine through power shell, I can understand why that may not be seen as the case until its mitigated, but its practically common sense anyway.
I also have no common sense with my browsing habits and have done far worse than an ACK flood attack. Most of my time is spent skidding it on XAttacker trying to upload backdoor PHP shells to Wordpess sites because its pretty much the only chance I have of achieving that with PHP being such an ass ugly language.
So with that in mind, the integrity of the owners is without a doubt in my mind. I am a walking IP blacklist. I’ve even had a server at 20% load been filled to 997% with anons chasing me - so when you assume you’ve pulled a stunt with your ACK flood attack, just remember some of us live our lives in a daily police psyop, unable to leave the house without being followed by strange people. Strange people who have undoubtedly asked proton VPN for my information and been brutally rejected because the staff are awesome.
Then theres you, ACK flooding the fucking actual VPN server its self from a VPN on the server. Please tell me you’re not being serious when you say you expected not to get banned because “no logs”. Its frankly retarded because ports have a cache that can reconstruct packets with the attackers host information if enough care iis taken with the data and these are CERN scientists. I would assume due to the general mechanics of a VPN it logs your IP on the way and while in use in since otherwise, it would have no idea you’re there at all, But again there’s 1,000,000 ways to trace you especially with “a nuke” so I’m not surprised.
I like you. I also go out my way to fuck over everyone on the internet for no conceivable gain other than destruction, and you should keep in touch. IIt’s like 6am here and I’ve not slept so sorry if I sound harsh it’s not a personal attack, just seems ridiculous with such a high traffic attack and general IP rules you expected to get away with an attack on their own shit.
And your intention was publicized clearly as to try to bring down proton VPN for being able to track you. Hence my remark because as I say, these people are champions helping 15000 users a day on the VPN achieve a more private and secure internet life, and god knows how many more benefit greatly from PGP encrypted email accounts, which also have no logs ( I know this because I got a password hacked on one. Wouldn’t normally care, but it was 100 characters and I was free of malware, so naturally went to ask and was informed they keep no identifiable information there).
The same can’t apply to the VPN because its impossible not to have a cyber footprint in such an environment.
If you do “big man tings” online also, then you should be giving these guys all the credit you can and supporting them. They’re Swedish and they’re making quite an impact on the privacy scene, evolution from which will allow us to be horrible people from behind even bigger walls. Scratch that back now
your failing to understand the limitations of a vpn vs something like tor which has a different set of limitations that is why some people like me like to use both.
That’s something entirely different. That is to prevent brute-force attacks and limits the devices, this doesn’t even happen on the VPN server.