But I don't see the danger in someone knowing that I use VPN.
True. However, it has also come out that NSA/Feds/etc. have asked and received copies of certificates, including private keys, from cert authorities and large customers.So nothing new here. Anonymity when using VPN can still only guaranteed by hiding behind seven proxies that can't be traced back to you. But the actual data is just as safe from the NSA as from any other attacker (if your VPN uses proper cryptography).
It's hard to trust that any internet traffic is private, unless you have your own backbone, ISP, and limit your traffic to your own closed-off network... in which case I guess you have your own intranet, not internet. 😀
Strongly encrypted files transferred through a VPN should still be safe, though.
But that makes you highly suspicious.
I've been strongly considering i2p2, tor etc but I do wonder what happens if I decide to also be an exit node, am I responsible for everyone else's traffic? I'd hate to use one of those without also contributing to it. It's kinda like downloading torrents without seeding. If nobody seeds, then the network is useless.
Back in the Cold War, we laughed at how the other side for how their government watched their own citizens, listened for every word they had to say.
I'm guessing all of the major US SSL certificate providers (Entrust, Verisign, etc.) give the government everyone's private keys. When you use SSL, you're trusting that the certificate signer is trustworthy, and they're probably not.
Back in the Cold War, we laughed at how the other side for how their government watched their own citizens, listened for every word they had to say.
"But the most significant missing evidence was the absence of any skid marks—even though the car made a 60-degree turn into a palm tree.
Research of this topic reveals a new angle to this story, namely —Boston Brakes.
This theory was explained by a former Marine Gordon Duff who refers to the “Boston Brakes” technique, in which “drive by wire” cars, specifically a Mercedes Benz, can be manipulated remotely to simulate an out-of-control accident, according to his Veterans Today story (The 2010 story is a must read). The story details are eerily similar to Hastings fiery accident scene as there were no skid marks.
Adding credence to the possible car-hacking scenario is former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarke. After news broke on the Hastings car accident, he confirmed the “drive by wire” concept.
Clarke told The Huffington Post that a single-vehicle crash is “consistent with a car cyber attack. There is reason to believe that intelligence agencies for major powers — including the United States — know how to remotely seize control of a car.”
http://libertyblitzkrieg.com/2013/0...kids-marks-a-flying-engine-and-boston-brakes/
http://www.sandiego6.com/story/details-of-reporter-hastings-death-remain-elusive-20130708
I think article was on Zerohedge and it seemed like one of their more conspiracy theory type posts, but article said some government agency can cause accident in car that uses fly by wire steering, because of suspicious death in car accident of some journalist who they were trying to muzzle.
Google search brought this similar article up:
That gives them suspicion that you're hiding something. So then they tap your phone and access your email.
What part of "Virtual" Private Network did you not understand?
It's a long story... and trust me, no, you really don't have time.
True. However, it has also come out that NSA/Feds/etc. have asked and received copies of certificates, including private keys, from cert authorities and large customers.
If your VPN provider is using a commercial certificate to exchange session keys, then you should assume that the NSA has the matching private key, permitting them to extract your session key.