https://torrentfreak.com/italy-approves-piracy-shield-vpn-dns-proposal-risk-of-prison-for-isps-intact-241001/

As title. Italy is decided to pass a law that basically creates a chinese-type firewall in the country. The question is simple: even if I’m not doing anything illegal, my VPN provider will have to know what am I doing to report it in case it’s illegal, or face jail.

So how could my traffic remain private in this scenario?

Can a VPN provider with no logs policy be held accountable of anything? Can it actually know what I’m doing?

  • shortwavesurfer@lemmy.zip
    link
    fedilink
    arrow-up
    17
    arrow-down
    1
    ·
    12 hours ago

    If it truly keeps no logs, then it cannot tell what you are doing. But otherwise, a VPN provider can indeed tell what you’re doing because you are only shifting the trust from your internet service provider to your VPN provider. I would highly recommend something like IVPN or Mullvad and only pay for it in Monero. That way, even if logs are kept, you are just a number account to them and they do not have a name for you.

    • ShortN0te@lemmy.ml
      link
      fedilink
      arrow-up
      8
      arrow-down
      8
      ·
      11 hours ago

      a VPN provider can indeed tell what you’re doing

      New to me that https is broken

      • delirious_owl@discuss.online
        link
        fedilink
        arrow-up
        2
        ·
        5 hours ago

        You can read more about this learning about X.509.

        Its the PKI thats broken, namely the root stores. Has been unreliable for many, many years. This is why packages are signed.

        • ShortN0te@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          2 hours ago

          You can read more about this learning about X.509.

          Its the PKI thats broken, namely the root stores. Has been unreliable for many, many years. This is why packages are signed.

          So you are basically saying that root CAs are unreliable or compromised?

          The great thing is, that you can decide on your own which CAs you trust. Also please proof that those are actively malicious.

          And no. That is not the reason that packages are signed, i am guessing you mean packages like on linux, packages contained in the installation repository. The reason is, that you build another chain of trust. Why would i trust a CA which issues certificates for domains with code distribution. That’s not their job.

          • mox@lemmy.sdf.org
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            47 minutes ago

            So you are basically saying that root CAs are unreliable or compromised?

            Not exactly. They are pointing out that HTTPS assumes all is well if it sees a certificate from any “trusted” certificate authority. Browsers typically trust dozens of CAs (nearly 80 for Firefox) from jurisdictions all over the world. Anyone with sufficient access to any of them can forge a certificate. That access might come from a hack, a rogue employee, government pressure, a bug, improperly handled backups, or various other means. It can happen, has happened, and will happen again.

            HTTPS is kind of mostly good enough for general use, since exploits are not so common as to make it useless, but if a government sees it as an obstacle, all bets are off. It is not comparable to a trustworthy VPN hosted outside of the government’s reach.

            Also, HTTPS doesn’t cover all traffic like a properly configured VPN does. Even where it is used and not compromised, it’s not difficult for a well positioned snooper (like an internet provider that has to answer to government) to follow your traffic on the net and deduce what you’re doing.

      • slazer2au@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        ·
        11 hours ago

        don’t have to break TLS to know what site you are accessing. The SNI of the cert does that.

        The specific url however is protected by TLS.

        • ShortN0te@lemmy.ml
          link
          fedilink
          arrow-up
          11
          ·
          11 hours ago

          They see what sites you are visiting yes but they do not see what you are doing on them. They do not see the content of the traffic. Huge difference.

            • ShortN0te@lemmy.ml
              link
              fedilink
              arrow-up
              4
              arrow-down
              2
              ·
              10 hours ago

              When you get judged based on what website you are visiting it is very likely that you are already the bad guy by using a vpn.

      • shortwavesurfer@lemmy.zip
        link
        fedilink
        arrow-up
        10
        arrow-down
        3
        ·
        11 hours ago

        HTTPS doesn’t stop them from knowing what you visited. It just stops them from knowing what you did while you were there. VVPN provider can still see that you visited Google, but they cannot see what you asked for Google to do for you.

        • ShortN0te@lemmy.ml
          link
          fedilink
          arrow-up
          8
          ·
          11 hours ago

          Yes. Not claimed otherwise. OC claimed that they see what you are doing which is wrong.

      • ExcessShiv@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        3
        arrow-down
        1
        ·
        11 hours ago

        That doesn’t really make a difference if no traffic history is saved. If there are no logs of traffic saved, there’s noting that can be tied to the account.