00:00:00
This is why you should always use a VPN
00:00:02
today or it can also look like this.
00:00:04
Very few VPNs can actually do this and
00:00:06
those that can't are virtually useless.
00:00:08
So, what is this? I'll show you not only
00:00:10
that, but also why VPN are pretty much a
00:00:12
waste of money, except for the very few
00:00:14
that can actually do this sort of magic
00:00:16
that I'm showing here, and I'll tell you
00:00:17
which ones they are. So, let's begin.
00:00:20
And no, this video is not sponsored by a
00:00:21
VPN or anyone for that matter. I've been
00:00:23
using virtual or private networks ever
00:00:25
since I started my privacy journey,
00:00:27
which was when Edward Snowden leaked the
00:00:29
NSA surveillance files. The reason to
00:00:31
use a VPN was immediately clear. The
00:00:33
global network of intelligence agencies
00:00:35
is spying on all of our phone records
00:00:37
and internet histories, and they aren't
00:00:39
doing it by Clintenstein hacking
00:00:41
operations. They get data directly from
00:00:43
internet companies who collaborate with
00:00:45
the surveillance state willingly. It was
00:00:46
necessary to prevent internet companies
00:00:48
from having immediate access to all of
00:00:50
our records. And in a limited sense, VPN
00:00:53
worked for a while. But from the moment
00:00:55
I started using VPN, I also realized
00:00:57
they actually have a major flaw. A flaw
00:00:59
that makes them not private at all, not
00:01:01
to mention anonymous. What's that flaw?
00:01:03
Well, it's not just a flaw. It's an
00:01:05
outright lie. What the VPN companies are
00:01:07
selling you in those sponsored YouTube
00:01:09
segment is a complete fabrication.
00:01:11
They're making you believe that when you
00:01:13
use a VPN, you hide your traffic from
00:01:15
the prying eyes. But you're not hiding
00:01:17
your traffic from anybody. The VPN
00:01:19
company sees your full traffic and it's
00:01:21
impossible for them not to see it. They
00:01:23
know who you are because they always
00:01:25
know your true real IP address and they
00:01:27
know every single website you go to
00:01:29
because they're routing your traffic for
00:01:30
you. You're basically trusting them not
00:01:32
to collect your internet history. They
00:01:34
may promise not to do it, but you have
00:01:36
no way of verifying that promise. And
00:01:38
those prying eyes can easily compromise
00:01:40
your VPN provider and steal your
00:01:42
internet records from them instead of
00:01:44
your ISV. This was always obvious and it
00:01:46
baffles me that I was the only one
00:01:48
saying this until I made it a
00:01:49
monetizable trend on YouTube because it
00:01:51
was me who first started telling
00:01:53
everybody that VPNs are a lie. Today you
00:01:56
see many videos of riding that ad
00:01:57
revenue train telling you how VPNs are
00:02:00
bad actually. But it was me who started
00:02:02
a train. More than 7 years ago I made my
00:02:05
first video about these VPN lies and
00:02:07
later on I continued making videos
00:02:08
bashing the VPN industry. Nobody was
00:02:11
saying what I was saying at the time
00:02:13
because VPN providers were running the
00:02:15
most lucrative advertising business
00:02:17
available to content creators. Pretty
00:02:19
much any video talking about VPNs would
00:02:21
be sponsored by or affiliated with a VPN
00:02:23
company. Getting sponsored by a VPN
00:02:25
company to then lie about how much you
00:02:27
need a VPN for privacy should be a
00:02:29
career ending conflict of interest in my
00:02:31
humble opinion. I never took a VPN
00:02:33
sponsorship deal because I always wanted
00:02:34
to be free to say anything I felt was
00:02:36
necessary free from those financial
00:02:38
constraints. I started the train
00:02:40
criticizing VPN years before anyone
00:02:42
else. Not because I was the first to
00:02:43
figure it out, but because I was the
00:02:45
first to have integrity and I still have
00:02:47
that integrity because I will never take
00:02:48
a sponsorship from a VPN company. Which
00:02:50
is why I need you to join my Patreon and
00:02:52
help me continue making my videos. I'm
00:02:54
not going to shy away from saying this
00:02:56
anymore. No one who is selling VPN deals
00:02:58
has integrity to talk about this.
00:03:00
Despite all of my critiques against VPN,
00:03:02
I never actually stopped using them. In
00:03:04
many of my videos, I actually recommend
00:03:06
VPN for online privacy. That sounds like
00:03:08
I'm contradicting myself and I'm not
00:03:10
even paid to do it. What is going on? Am
00:03:12
I stupid? Well, I might be stupid, but
00:03:14
I'm also right. And I know how to do
00:03:15
research and I do it better than anyone
00:03:17
else on this scene. You will never find
00:03:19
more deeply researched and better source
00:03:21
videos on these topics than mine. I
00:03:22
don't just throw random links. I cross
00:03:24
reference and annotate everything I talk
00:03:26
about to triple check that I'm correct.
00:03:28
So, allow me to explain to you why in
00:03:30
2025 you actually do need a VPN. And not
00:03:32
just any VPN, a very small handpicked
00:03:35
selection of VPNs that actually go
00:03:36
beyond what anyone else in the industry
00:03:38
offers. And because this video is not
00:03:40
sponsored, support my work on Patreon if
00:03:42
you like what I do. And yes, I did
00:03:44
undergo a surgery to have a pair of ribs
00:03:45
removed so that I can perform this self
00:03:47
brain ding. He's licking his balls. When
00:03:49
you visit a website, this is what it
00:03:51
actually looks like behind the scenes.
00:03:52
Each column represents a packet. A
00:03:54
packet is just a pile of data traveling
00:03:56
to and from your device to and from a
00:03:58
website you are visiting. When you visit
00:04:00
a website, you're both downloading some
00:04:01
of this data as well as uploading some
00:04:03
of your data to the website. These
00:04:05
packets have different sizes which is
00:04:07
represented by the length of the column.
00:04:08
The yellow packets on this graph are
00:04:10
sent from your device to the website and
00:04:12
gray packets are sent from the website
00:04:14
to you. Your data flows through the
00:04:17
internet at different timestamps which
00:04:18
means that the space between these
00:04:20
columns as well as their order also
00:04:22
matters. It represents different timings
00:04:24
of each individual packet going back and
00:04:26
forth. Now, why is all of this
00:04:28
important? Because every website you go
00:04:30
to will have its set of packets that
00:04:32
will form a pattern of different sizes,
00:04:34
timings, and directions. And every
00:04:36
website will develop a uniquely
00:04:38
recognizable pattern, a website
00:04:40
fingerprint. Now, there are billions of
00:04:41
websites with billions of fingerprints.
00:04:43
And knowing every single one of them is
00:04:45
kind of difficult. But the most popular
00:04:47
websites, the ones you visit every day,
00:04:49
their fingerprints are easily
00:04:51
recognizable. Thus, it is possible to
00:04:53
discern for an internet company that you
00:04:55
go to facebook.com even if you use a
00:04:57
VPN. Even with IP offiscation and all
00:04:59
the encryption available, spies and
00:05:01
telekin companies can correlate
00:05:03
fingerprint patterns of millions of
00:05:05
websites and see which ones exactly you
00:05:06
visit and use. This level of attack even
00:05:08
works in endto-end encrypted messaging
00:05:10
apps. When you send a text message over
00:05:12
a signal, its content is encrypted, but
00:05:15
the pattern of the traffic will be
00:05:17
observable. If you send an image to your
00:05:19
signal contacts, there will be a sudden
00:05:21
spike in the traffic and the adversary
00:05:23
will be able to detect that you just
00:05:25
sent an image in your chat. It would
00:05:26
still be encrypted. They will not be
00:05:28
able to see what kind of image you send
00:05:30
obviously. But if you, let's say, just
00:05:32
downloaded a popular meme or a viral
00:05:34
image from a current event, the size of
00:05:36
those packets may be correlated to
00:05:38
decipher who you are sending your
00:05:39
naughty memes to. This packet
00:05:41
correlation can also deidentify
00:05:42
anonymous users even without
00:05:44
identifiable information. That's pretty
00:05:47
crazy. And what makes all of this even
00:05:49
worse, like way worse, is the
00:05:51
advancement of deep learning and pattern
00:05:53
recognition, which is becoming cheaper
00:05:55
and more powerful every day. AI is being
00:05:58
deployed by companies and government
00:05:59
agencies to spy on our traffic and
00:06:01
decipher what we do, even when our
00:06:03
connections are encrypted, and it's
00:06:05
called traffic analysis. The most common
00:06:08
adversaries deploying traffic analysis
00:06:09
are ISB companies, government
00:06:11
authorities, but also third parties like
00:06:13
data brokers who can purchase your
00:06:15
internet records and analyze their
00:06:17
patterns. This means you're always
00:06:19
exposed to this level of thread no
00:06:21
matter where you are as long as you're
00:06:22
connected to the internet. This AI
00:06:24
enhanced traffic analysis can reveal all
00:06:26
your browsing habits and behaviors. It
00:06:28
can tell them where you shop, where you
00:06:29
get your books and music from, how you
00:06:31
use social media, who you chat and call
00:06:33
with, what communities you engage with,
00:06:35
and everyone's internet records will be
00:06:37
slightly different. So, traffic analysis
00:06:39
will always be able to identify you,
00:06:41
even if you use hidden anonymous
00:06:43
networks like tour. These AI enhanced
00:06:45
surveillance techniques are extremely
00:06:47
powerful. So, the question is, what can
00:06:50
you do to defend against them? That's
00:06:51
what the title of this video is about,
00:06:53
using a VPN that can defend against AI
00:06:55
enhanced traffic analysis. Thanks to
00:06:57
some good people around the world,
00:06:58
various defense methods have already
00:07:00
been developed and researchers have
00:07:02
confirmed their ability to reduce the
00:07:03
accuracy rate of traffic analysis
00:07:05
attacks. The goal of defense is
00:07:07
essentially to make these unique data
00:07:08
fingerprints not unique anymore. So, how
00:07:10
can it be done? One way to miss these
00:07:12
unique fingerprints up is by introducing
00:07:15
dummy packets, but sufficiently advanced
00:07:17
AI can sometimes discern noise from real
00:07:19
traffic. So, you might need more than
00:07:21
one line of defense. Another defense
00:07:23
technique is imitation, making traffic
00:07:25
from one website look like traffic from
00:07:27
another website. There are also these
00:07:28
alteration defenses that try to
00:07:30
unpredictably modify the traffic to make
00:07:32
it harder to trace by an AI. Another
00:07:34
similar defense is to unpredictably
00:07:36
split the traffic into multiple paths so
00:07:38
that AI doesn't know what to do with it.
00:07:40
There are also more advanced defense
00:07:42
protocols like maybe not which tries to
00:07:44
defeat the deep learning traffic
00:07:45
analysis by lowering its accuracy from
00:07:48
more than 90% to less than 10%. And one
00:07:51
of the most ambitious lines of defense
00:07:53
is so-called mixnet, which is mixing
00:07:55
traffic from multiple sources together
00:07:57
to make it an incernible sub of mixed up
00:07:59
data. So when it comes to picking your
00:08:01
next VPN, you have to choose one that
00:08:03
implements a combination of the
00:08:04
strongest defense tools against AI
00:08:06
traffic analysis. That's what you are
00:08:08
here for. So which ones are the best?
00:08:10
MuladVPN is one of the longest trusted
00:08:12
VPN providers that just started doing
00:08:14
that. They have implemented multiple
00:08:15
defense tools into a new protocol they
00:08:17
call data. Defense against AIG guided
00:08:20
traffic analysis. Data is actually doing
00:08:22
multiple things at once. It is
00:08:24
introducing random noise into your
00:08:25
traffic. Basically injecting that fake
00:08:27
traffic into real traffic. Then data is
00:08:30
planting dummy packets into the traffic
00:08:32
itself in both directions between you
00:08:34
and the server which is to essentially
00:08:36
modify your real traffic. And the third
00:08:38
line of defense of data is to create
00:08:40
constant packet sizes which makes it
00:08:42
impossible for traffic analysis to find
00:08:45
fingerprints of the website you go to or
00:08:47
who you communicate with. There is an
00:08:49
even more extreme example than this and
00:08:51
it's from Nimvpn. Nim is actually
00:08:53
derived from the NIM mixet which is like
00:08:55
a machine laundering your data and
00:08:57
offiscating it by rerouting your traffic
00:08:59
through five noise generating mixnet
00:09:02
hops. Your data packets are also
00:09:04
anonymized in a similar way to Mulvad's
00:09:06
data before reaching their destination.
00:09:08
NIM's approach is the most comprehensive
00:09:10
and extreme one that I that I know of.
00:09:12
Um because it is trying to do this for
00:09:14
every application to provide the
00:09:16
broadest network layer privacy. There
00:09:19
are a few caveats with both Mulad and
00:09:21
NIM. The traffic analysis defenses are
00:09:23
not enabled by default. So you have to
00:09:25
manually choose for them. And the reason
00:09:27
they are not the default is they're
00:09:29
another limitation. They are actually
00:09:31
quite resource intensive. All the
00:09:33
introduction of dummy packets, fake
00:09:35
traffic, making all the packets the same
00:09:37
size, that's going to put a drain on
00:09:39
your battery as well as your data plan.
00:09:41
So, I'd recommend that you start with
00:09:42
this on your PC, see how it works. And
00:09:45
if you're comfortable with the
00:09:46
performance, then go ahead and try it on
00:09:48
your phone. What is going to make things
00:09:50
better is when more people use these
00:09:52
defenses, the better tested these tools
00:09:54
become and the more everyone's traffic
00:09:56
contributes to the total anonymity of
00:09:58
everyone's internet usage. These cutting
00:10:00
edge defense techniques are bound to get
00:10:02
better and more widely implemented. If I
00:10:04
had to guess, ProtonVPN and IVPN will be
00:10:07
the next two providers to adopt a
00:10:09
variation of them. IVPN recently
00:10:11
acquired safing which comes with its own
00:10:13
privacy network that is splitting all of
00:10:15
their traffic connections into their own
00:10:17
chains of multiple individual hubs. But
00:10:19
out of all the names I mentioned here,
00:10:21
Mulvat in my opinion definitely takes
00:10:23
the crown. YouTube is doing its job to
00:10:25
keep me poor. So go and support me on
00:10:27
Patreon and unlock my podcast. Thank you
00:10:29
for your time and have a good