AKSHUALLY! You Should ALWAYS Use A VPN!

00:10:31
https://www.youtube.com/watch?v=6AynIIFM2WU

Resumen

TLDRVideyo a diskite sou enpòtans itilize yon VPN ak pwoblèm ki asosye ak yo. Otè a, ki te kòmanse kritike VPN depi plizyè ane, eksplike ke anpil VPN pa ofri pwoteksyon reyèl, paske yo toujou ka wè trafik itilizatè yo. Li pataje metòd defans ki ka ede pwoteje kont analiz trafik ki itilize AI, ak rekòmande kèk VPN ki ofri pwoteksyon avanse kont sa yo, tankou MulvadVPN ak NimVPN. Li ensiste sou nesesite pou chwazi VPN ki gen karakteristik defans avanse pou asire vi prive sou entènèt.

Para llevar

  • 🔒 VPN yo pa tout ofri pwoteksyon reyèl.
  • 🕵️‍♂️ Siveyans sou entènèt se yon pwoblèm grav.
  • 💻 MulvadVPN ak NimVPN ofri pwoteksyon avanse.
  • 📊 Analiz trafik ka dekouvri modèl itilizasyon ou.
  • 🛡️ Metòd defans avanse ka ede pwoteje kont AI.
  • 📈 Pi plis moun ki itilize defans sa yo, pi bon yo vin.
  • 🤖 AI ap itilize pou analize trafik sou entènèt.
  • 📅 Chwazi VPN ki gen karakteristik defans avanse.
  • 💡 Pa tout VPN yo ofri menm nivo sekirite.
  • 💰 Sipòte otè a sou Patreon pou plis kontni.

Cronología

  • 00:00:00 - 00:05:00

    Nan videyo sa a, oratè a eksplike poukisa li enpòtan pou itilize yon VPN, men li fè konnen ke anpil VPN pa efikas e yo ka menm fè plis mal pase byen. Li pataje eksperyans li depi li te kòmanse itilize VPN apre Edward Snowden te revele dosye siveyans NSA a, ki montre kijan ajans entèlijans yo ap siveye aktivite sou entènèt nou yo. Oratè a kritike endistri VPN a, di ke yo fè pwomès ki pa ka verifye e ke yo ka kolekte enfòmasyon sou itilizatè yo, sa ki fè yo pa vrèman prive. Li ensiste sou enpòtans entegrite nan kritik li yo, paske li pa janm aksepte patenarya ak konpayi VPN yo, sa ki pèmèt li pale libreman sou pwoblèm sa yo.

  • 00:05:00 - 00:10:31

    Oratè a kontinye eksplike kijan trafik sou entènèt la ka analize, menm lè li ankripte, ak kijan AI ap itilize teknik avanse pou detekte modèl trafik sa yo. Li prezante kèk metòd defans ki ka diminye presizyon atak analiz trafik, tankou entrodiksyon pakè fo, imite trafik, ak divize trafik nan plizyè chemen. Li rekòmande kèk VPN ki aplike teknik defans sa yo, tankou MulvadVPN ak NimVPN, ki ofri pwotokòl avanse pou pwoteje kont analiz trafik AI. Li fè konnen ke itilizatè yo dwe chwazi metòd defans sa yo manyèlman, paske yo pa aktive pa defo, e li konseye yo teste yo sou PC anvan yo itilize yo sou telefòn mobil.

Mapa mental

Vídeo de preguntas y respuestas

  • Ki sa ki yon VPN?

    Yon VPN (Rezo Prive Vityèl) se yon sèvis ki kreye yon koneksyon an sekirite sou entènèt la.

  • Poukisa mwen ta dwe itilize yon VPN?

    VPN yo itilize pou pwoteje vi prive sou entènèt, anpeche siveyans ak aksè san otorizasyon nan done yo.

  • Ki pwoblèm ki asosye ak VPN yo?

    Anpil VPN pa ofri pwoteksyon reyèl, paske yo ka toujou wè trafik itilizatè yo.

  • Ki VPN ki pi bon pou itilize?

    MulvadVPN ak NimVPN se de VPN ki ofri pwoteksyon avanse kont analiz trafik.

  • Kijan mwen ka pwoteje tèt mwen kont analiz trafik?

    Itilize VPN ki gen metòd defans avanse kont analiz trafik, tankou sa yo ki itilize teknik melanj ak bri.

  • Eske tout VPN yo ofri menm nivo sekirite?

    Non, pa tout VPN yo ofri menm nivo sekirite; kèk gen plis karakteristik pwoteksyon pase lòt.

  • Kijan mwen ka verifye si yon VPN respekte pwomès li yo?

    Li difisil pou verifye, men ou ka chèche revizyon ak analiz endepandan sou VPN yo.

  • Ki sa ki analiz trafik?

    Analiz trafik se yon teknik ki itilize pou etidye modèl trafik sou entènèt la, menm si trafik la ankripte.

  • Kisa ki 'mixnet'?

    Mixnet se yon teknik ki melanje trafik soti nan plizyè sous pou pwoteje idantite itilizatè yo.

  • Kijan mwen ka sipòte travay otè a?

    Ou ka sipòte otè a sou Patreon pou ede l kontinye fè videyo.

Ver más resúmenes de vídeos

Obtén acceso instantáneo a resúmenes gratuitos de vídeos de YouTube gracias a la IA.
Subtítulos
en
Desplazamiento automático:
  • 00:00:00
    This is why you should always use a VPN
  • 00:00:02
    today or it can also look like this.
  • 00:00:04
    Very few VPNs can actually do this and
  • 00:00:06
    those that can't are virtually useless.
  • 00:00:08
    So, what is this? I'll show you not only
  • 00:00:10
    that, but also why VPN are pretty much a
  • 00:00:12
    waste of money, except for the very few
  • 00:00:14
    that can actually do this sort of magic
  • 00:00:16
    that I'm showing here, and I'll tell you
  • 00:00:17
    which ones they are. So, let's begin.
  • 00:00:20
    And no, this video is not sponsored by a
  • 00:00:21
    VPN or anyone for that matter. I've been
  • 00:00:23
    using virtual or private networks ever
  • 00:00:25
    since I started my privacy journey,
  • 00:00:27
    which was when Edward Snowden leaked the
  • 00:00:29
    NSA surveillance files. The reason to
  • 00:00:31
    use a VPN was immediately clear. The
  • 00:00:33
    global network of intelligence agencies
  • 00:00:35
    is spying on all of our phone records
  • 00:00:37
    and internet histories, and they aren't
  • 00:00:39
    doing it by Clintenstein hacking
  • 00:00:41
    operations. They get data directly from
  • 00:00:43
    internet companies who collaborate with
  • 00:00:45
    the surveillance state willingly. It was
  • 00:00:46
    necessary to prevent internet companies
  • 00:00:48
    from having immediate access to all of
  • 00:00:50
    our records. And in a limited sense, VPN
  • 00:00:53
    worked for a while. But from the moment
  • 00:00:55
    I started using VPN, I also realized
  • 00:00:57
    they actually have a major flaw. A flaw
  • 00:00:59
    that makes them not private at all, not
  • 00:01:01
    to mention anonymous. What's that flaw?
  • 00:01:03
    Well, it's not just a flaw. It's an
  • 00:01:05
    outright lie. What the VPN companies are
  • 00:01:07
    selling you in those sponsored YouTube
  • 00:01:09
    segment is a complete fabrication.
  • 00:01:11
    They're making you believe that when you
  • 00:01:13
    use a VPN, you hide your traffic from
  • 00:01:15
    the prying eyes. But you're not hiding
  • 00:01:17
    your traffic from anybody. The VPN
  • 00:01:19
    company sees your full traffic and it's
  • 00:01:21
    impossible for them not to see it. They
  • 00:01:23
    know who you are because they always
  • 00:01:25
    know your true real IP address and they
  • 00:01:27
    know every single website you go to
  • 00:01:29
    because they're routing your traffic for
  • 00:01:30
    you. You're basically trusting them not
  • 00:01:32
    to collect your internet history. They
  • 00:01:34
    may promise not to do it, but you have
  • 00:01:36
    no way of verifying that promise. And
  • 00:01:38
    those prying eyes can easily compromise
  • 00:01:40
    your VPN provider and steal your
  • 00:01:42
    internet records from them instead of
  • 00:01:44
    your ISV. This was always obvious and it
  • 00:01:46
    baffles me that I was the only one
  • 00:01:48
    saying this until I made it a
  • 00:01:49
    monetizable trend on YouTube because it
  • 00:01:51
    was me who first started telling
  • 00:01:53
    everybody that VPNs are a lie. Today you
  • 00:01:56
    see many videos of riding that ad
  • 00:01:57
    revenue train telling you how VPNs are
  • 00:02:00
    bad actually. But it was me who started
  • 00:02:02
    a train. More than 7 years ago I made my
  • 00:02:05
    first video about these VPN lies and
  • 00:02:07
    later on I continued making videos
  • 00:02:08
    bashing the VPN industry. Nobody was
  • 00:02:11
    saying what I was saying at the time
  • 00:02:13
    because VPN providers were running the
  • 00:02:15
    most lucrative advertising business
  • 00:02:17
    available to content creators. Pretty
  • 00:02:19
    much any video talking about VPNs would
  • 00:02:21
    be sponsored by or affiliated with a VPN
  • 00:02:23
    company. Getting sponsored by a VPN
  • 00:02:25
    company to then lie about how much you
  • 00:02:27
    need a VPN for privacy should be a
  • 00:02:29
    career ending conflict of interest in my
  • 00:02:31
    humble opinion. I never took a VPN
  • 00:02:33
    sponsorship deal because I always wanted
  • 00:02:34
    to be free to say anything I felt was
  • 00:02:36
    necessary free from those financial
  • 00:02:38
    constraints. I started the train
  • 00:02:40
    criticizing VPN years before anyone
  • 00:02:42
    else. Not because I was the first to
  • 00:02:43
    figure it out, but because I was the
  • 00:02:45
    first to have integrity and I still have
  • 00:02:47
    that integrity because I will never take
  • 00:02:48
    a sponsorship from a VPN company. Which
  • 00:02:50
    is why I need you to join my Patreon and
  • 00:02:52
    help me continue making my videos. I'm
  • 00:02:54
    not going to shy away from saying this
  • 00:02:56
    anymore. No one who is selling VPN deals
  • 00:02:58
    has integrity to talk about this.
  • 00:03:00
    Despite all of my critiques against VPN,
  • 00:03:02
    I never actually stopped using them. In
  • 00:03:04
    many of my videos, I actually recommend
  • 00:03:06
    VPN for online privacy. That sounds like
  • 00:03:08
    I'm contradicting myself and I'm not
  • 00:03:10
    even paid to do it. What is going on? Am
  • 00:03:12
    I stupid? Well, I might be stupid, but
  • 00:03:14
    I'm also right. And I know how to do
  • 00:03:15
    research and I do it better than anyone
  • 00:03:17
    else on this scene. You will never find
  • 00:03:19
    more deeply researched and better source
  • 00:03:21
    videos on these topics than mine. I
  • 00:03:22
    don't just throw random links. I cross
  • 00:03:24
    reference and annotate everything I talk
  • 00:03:26
    about to triple check that I'm correct.
  • 00:03:28
    So, allow me to explain to you why in
  • 00:03:30
    2025 you actually do need a VPN. And not
  • 00:03:32
    just any VPN, a very small handpicked
  • 00:03:35
    selection of VPNs that actually go
  • 00:03:36
    beyond what anyone else in the industry
  • 00:03:38
    offers. And because this video is not
  • 00:03:40
    sponsored, support my work on Patreon if
  • 00:03:42
    you like what I do. And yes, I did
  • 00:03:44
    undergo a surgery to have a pair of ribs
  • 00:03:45
    removed so that I can perform this self
  • 00:03:47
    brain ding. He's licking his balls. When
  • 00:03:49
    you visit a website, this is what it
  • 00:03:51
    actually looks like behind the scenes.
  • 00:03:52
    Each column represents a packet. A
  • 00:03:54
    packet is just a pile of data traveling
  • 00:03:56
    to and from your device to and from a
  • 00:03:58
    website you are visiting. When you visit
  • 00:04:00
    a website, you're both downloading some
  • 00:04:01
    of this data as well as uploading some
  • 00:04:03
    of your data to the website. These
  • 00:04:05
    packets have different sizes which is
  • 00:04:07
    represented by the length of the column.
  • 00:04:08
    The yellow packets on this graph are
  • 00:04:10
    sent from your device to the website and
  • 00:04:12
    gray packets are sent from the website
  • 00:04:14
    to you. Your data flows through the
  • 00:04:17
    internet at different timestamps which
  • 00:04:18
    means that the space between these
  • 00:04:20
    columns as well as their order also
  • 00:04:22
    matters. It represents different timings
  • 00:04:24
    of each individual packet going back and
  • 00:04:26
    forth. Now, why is all of this
  • 00:04:28
    important? Because every website you go
  • 00:04:30
    to will have its set of packets that
  • 00:04:32
    will form a pattern of different sizes,
  • 00:04:34
    timings, and directions. And every
  • 00:04:36
    website will develop a uniquely
  • 00:04:38
    recognizable pattern, a website
  • 00:04:40
    fingerprint. Now, there are billions of
  • 00:04:41
    websites with billions of fingerprints.
  • 00:04:43
    And knowing every single one of them is
  • 00:04:45
    kind of difficult. But the most popular
  • 00:04:47
    websites, the ones you visit every day,
  • 00:04:49
    their fingerprints are easily
  • 00:04:51
    recognizable. Thus, it is possible to
  • 00:04:53
    discern for an internet company that you
  • 00:04:55
    go to facebook.com even if you use a
  • 00:04:57
    VPN. Even with IP offiscation and all
  • 00:04:59
    the encryption available, spies and
  • 00:05:01
    telekin companies can correlate
  • 00:05:03
    fingerprint patterns of millions of
  • 00:05:05
    websites and see which ones exactly you
  • 00:05:06
    visit and use. This level of attack even
  • 00:05:08
    works in endto-end encrypted messaging
  • 00:05:10
    apps. When you send a text message over
  • 00:05:12
    a signal, its content is encrypted, but
  • 00:05:15
    the pattern of the traffic will be
  • 00:05:17
    observable. If you send an image to your
  • 00:05:19
    signal contacts, there will be a sudden
  • 00:05:21
    spike in the traffic and the adversary
  • 00:05:23
    will be able to detect that you just
  • 00:05:25
    sent an image in your chat. It would
  • 00:05:26
    still be encrypted. They will not be
  • 00:05:28
    able to see what kind of image you send
  • 00:05:30
    obviously. But if you, let's say, just
  • 00:05:32
    downloaded a popular meme or a viral
  • 00:05:34
    image from a current event, the size of
  • 00:05:36
    those packets may be correlated to
  • 00:05:38
    decipher who you are sending your
  • 00:05:39
    naughty memes to. This packet
  • 00:05:41
    correlation can also deidentify
  • 00:05:42
    anonymous users even without
  • 00:05:44
    identifiable information. That's pretty
  • 00:05:47
    crazy. And what makes all of this even
  • 00:05:49
    worse, like way worse, is the
  • 00:05:51
    advancement of deep learning and pattern
  • 00:05:53
    recognition, which is becoming cheaper
  • 00:05:55
    and more powerful every day. AI is being
  • 00:05:58
    deployed by companies and government
  • 00:05:59
    agencies to spy on our traffic and
  • 00:06:01
    decipher what we do, even when our
  • 00:06:03
    connections are encrypted, and it's
  • 00:06:05
    called traffic analysis. The most common
  • 00:06:08
    adversaries deploying traffic analysis
  • 00:06:09
    are ISB companies, government
  • 00:06:11
    authorities, but also third parties like
  • 00:06:13
    data brokers who can purchase your
  • 00:06:15
    internet records and analyze their
  • 00:06:17
    patterns. This means you're always
  • 00:06:19
    exposed to this level of thread no
  • 00:06:21
    matter where you are as long as you're
  • 00:06:22
    connected to the internet. This AI
  • 00:06:24
    enhanced traffic analysis can reveal all
  • 00:06:26
    your browsing habits and behaviors. It
  • 00:06:28
    can tell them where you shop, where you
  • 00:06:29
    get your books and music from, how you
  • 00:06:31
    use social media, who you chat and call
  • 00:06:33
    with, what communities you engage with,
  • 00:06:35
    and everyone's internet records will be
  • 00:06:37
    slightly different. So, traffic analysis
  • 00:06:39
    will always be able to identify you,
  • 00:06:41
    even if you use hidden anonymous
  • 00:06:43
    networks like tour. These AI enhanced
  • 00:06:45
    surveillance techniques are extremely
  • 00:06:47
    powerful. So, the question is, what can
  • 00:06:50
    you do to defend against them? That's
  • 00:06:51
    what the title of this video is about,
  • 00:06:53
    using a VPN that can defend against AI
  • 00:06:55
    enhanced traffic analysis. Thanks to
  • 00:06:57
    some good people around the world,
  • 00:06:58
    various defense methods have already
  • 00:07:00
    been developed and researchers have
  • 00:07:02
    confirmed their ability to reduce the
  • 00:07:03
    accuracy rate of traffic analysis
  • 00:07:05
    attacks. The goal of defense is
  • 00:07:07
    essentially to make these unique data
  • 00:07:08
    fingerprints not unique anymore. So, how
  • 00:07:10
    can it be done? One way to miss these
  • 00:07:12
    unique fingerprints up is by introducing
  • 00:07:15
    dummy packets, but sufficiently advanced
  • 00:07:17
    AI can sometimes discern noise from real
  • 00:07:19
    traffic. So, you might need more than
  • 00:07:21
    one line of defense. Another defense
  • 00:07:23
    technique is imitation, making traffic
  • 00:07:25
    from one website look like traffic from
  • 00:07:27
    another website. There are also these
  • 00:07:28
    alteration defenses that try to
  • 00:07:30
    unpredictably modify the traffic to make
  • 00:07:32
    it harder to trace by an AI. Another
  • 00:07:34
    similar defense is to unpredictably
  • 00:07:36
    split the traffic into multiple paths so
  • 00:07:38
    that AI doesn't know what to do with it.
  • 00:07:40
    There are also more advanced defense
  • 00:07:42
    protocols like maybe not which tries to
  • 00:07:44
    defeat the deep learning traffic
  • 00:07:45
    analysis by lowering its accuracy from
  • 00:07:48
    more than 90% to less than 10%. And one
  • 00:07:51
    of the most ambitious lines of defense
  • 00:07:53
    is so-called mixnet, which is mixing
  • 00:07:55
    traffic from multiple sources together
  • 00:07:57
    to make it an incernible sub of mixed up
  • 00:07:59
    data. So when it comes to picking your
  • 00:08:01
    next VPN, you have to choose one that
  • 00:08:03
    implements a combination of the
  • 00:08:04
    strongest defense tools against AI
  • 00:08:06
    traffic analysis. That's what you are
  • 00:08:08
    here for. So which ones are the best?
  • 00:08:10
    MuladVPN is one of the longest trusted
  • 00:08:12
    VPN providers that just started doing
  • 00:08:14
    that. They have implemented multiple
  • 00:08:15
    defense tools into a new protocol they
  • 00:08:17
    call data. Defense against AIG guided
  • 00:08:20
    traffic analysis. Data is actually doing
  • 00:08:22
    multiple things at once. It is
  • 00:08:24
    introducing random noise into your
  • 00:08:25
    traffic. Basically injecting that fake
  • 00:08:27
    traffic into real traffic. Then data is
  • 00:08:30
    planting dummy packets into the traffic
  • 00:08:32
    itself in both directions between you
  • 00:08:34
    and the server which is to essentially
  • 00:08:36
    modify your real traffic. And the third
  • 00:08:38
    line of defense of data is to create
  • 00:08:40
    constant packet sizes which makes it
  • 00:08:42
    impossible for traffic analysis to find
  • 00:08:45
    fingerprints of the website you go to or
  • 00:08:47
    who you communicate with. There is an
  • 00:08:49
    even more extreme example than this and
  • 00:08:51
    it's from Nimvpn. Nim is actually
  • 00:08:53
    derived from the NIM mixet which is like
  • 00:08:55
    a machine laundering your data and
  • 00:08:57
    offiscating it by rerouting your traffic
  • 00:08:59
    through five noise generating mixnet
  • 00:09:02
    hops. Your data packets are also
  • 00:09:04
    anonymized in a similar way to Mulvad's
  • 00:09:06
    data before reaching their destination.
  • 00:09:08
    NIM's approach is the most comprehensive
  • 00:09:10
    and extreme one that I that I know of.
  • 00:09:12
    Um because it is trying to do this for
  • 00:09:14
    every application to provide the
  • 00:09:16
    broadest network layer privacy. There
  • 00:09:19
    are a few caveats with both Mulad and
  • 00:09:21
    NIM. The traffic analysis defenses are
  • 00:09:23
    not enabled by default. So you have to
  • 00:09:25
    manually choose for them. And the reason
  • 00:09:27
    they are not the default is they're
  • 00:09:29
    another limitation. They are actually
  • 00:09:31
    quite resource intensive. All the
  • 00:09:33
    introduction of dummy packets, fake
  • 00:09:35
    traffic, making all the packets the same
  • 00:09:37
    size, that's going to put a drain on
  • 00:09:39
    your battery as well as your data plan.
  • 00:09:41
    So, I'd recommend that you start with
  • 00:09:42
    this on your PC, see how it works. And
  • 00:09:45
    if you're comfortable with the
  • 00:09:46
    performance, then go ahead and try it on
  • 00:09:48
    your phone. What is going to make things
  • 00:09:50
    better is when more people use these
  • 00:09:52
    defenses, the better tested these tools
  • 00:09:54
    become and the more everyone's traffic
  • 00:09:56
    contributes to the total anonymity of
  • 00:09:58
    everyone's internet usage. These cutting
  • 00:10:00
    edge defense techniques are bound to get
  • 00:10:02
    better and more widely implemented. If I
  • 00:10:04
    had to guess, ProtonVPN and IVPN will be
  • 00:10:07
    the next two providers to adopt a
  • 00:10:09
    variation of them. IVPN recently
  • 00:10:11
    acquired safing which comes with its own
  • 00:10:13
    privacy network that is splitting all of
  • 00:10:15
    their traffic connections into their own
  • 00:10:17
    chains of multiple individual hubs. But
  • 00:10:19
    out of all the names I mentioned here,
  • 00:10:21
    Mulvat in my opinion definitely takes
  • 00:10:23
    the crown. YouTube is doing its job to
  • 00:10:25
    keep me poor. So go and support me on
  • 00:10:27
    Patreon and unlock my podcast. Thank you
  • 00:10:29
    for your time and have a good
Etiquetas
  • VPN
  • vi prive
  • analiz trafik
  • MulvadVPN
  • NimVPN
  • siveyans
  • pwoteksyon
  • AI
  • internet
  • defans