Make sure your router has built-in VPN support folks. That way when some shit like this does eventually pass all your traffic can flow over the VPN for your entire network.
This law seems to be aimed at taking down hosted content though, so you can connect over your VPN but the sites won’t be there to connect to, unless they move their hosting out of the USA. And even that might not be enough to protect US companies from being forced to take the content down if they want to survive.
I’ve had this setup and would recommend but since I’ve switched from OpenVPN to Wiregaurd I’m getting constantly hit by cloud flare verification s and captchas… and my IP hasn’t changed once since. Wondering if that’s just the environment now or specific to my protocol change. Any readers’ experiences?
Cloudfare sees a lot of traffic from a single ip and performs the checks you’re seeing to make sure it’s not malicious. Google will do the same, as will a number of other services.
Best of all captchas which require human interaction are completely redundant anyways. From a security perspective anyways (blocking bots generating huge amounts of traffic)… For training your next LLM however…
Make sure to own your router, I’d say. Set you ISP router to modem mode and use OpnSense on a APU as router where you have full control. You can filter ads with adGuard and you can use wireGuard and openVPN to connect to a VPN provider as well as setting up an endpoint so you can protect yourself even on the go and even on locked up systems like iOS.
Except, Apple does let some of their own packages not go through VPN, which is very shady, tho.
If you’re savy then install open wrt on it. If you want expert mode, then install pfsense on an old PC/laptop. If you want pucker factor, then install pfsense in a VM where the host machine gets it’s ip from the VM.
It’s actually not bad to do it as long as your host machine has a static ip. Makes it easier to take a snapshot before you make major changes. Just be prepared with an extra router. If you have a family the second the Internet is not working you will be blamed.
Yeah. There’s a possibility that there is a backdoor built into the soc, but that would be nation state level stuff that would be extremely difficult to uncover.
Ok cool thanks, I’ll probably go with something on this list then. My other things I was looking at were the Turris Omnia and the Peplink B-one, but tbh a lynksys with openwrt will likely serve me fine.
Make sure your router has built-in VPN support folks. That way when some shit like this does eventually pass all your traffic can flow over the VPN for your entire network.
This law seems to be aimed at taking down hosted content though, so you can connect over your VPN but the sites won’t be there to connect to, unless they move their hosting out of the USA. And even that might not be enough to protect US companies from being forced to take the content down if they want to survive.
I’ve had this setup and would recommend but since I’ve switched from OpenVPN to Wiregaurd I’m getting constantly hit by cloud flare verification s and captchas… and my IP hasn’t changed once since. Wondering if that’s just the environment now or specific to my protocol change. Any readers’ experiences?
Cloudfare sees a lot of traffic from a single ip and performs the checks you’re seeing to make sure it’s not malicious. Google will do the same, as will a number of other services.
It’s the nature of a shared vpn service.
I have this all the time when I’m on my mullvald vpn. Makes me want to not use it half the time :(
That is the goal, I guess, big tech companies don’t like if one protects their privacy…
Best of all captchas which require human interaction are completely redundant anyways. From a security perspective anyways (blocking bots generating huge amounts of traffic)… For training your next LLM however…
Make sure to own your router, I’d say. Set you ISP router to modem mode and use OpnSense on a APU as router where you have full control. You can filter ads with adGuard and you can use wireGuard and openVPN to connect to a VPN provider as well as setting up an endpoint so you can protect yourself even on the go and even on locked up systems like iOS.
Except, Apple does let some of their own packages not go through VPN, which is very shady, tho.
If you’re savy then install open wrt on it. If you want expert mode, then install pfsense on an old PC/laptop. If you want pucker factor, then install pfsense in a VM where the host machine gets it’s ip from the VM.
Why are you like this, and who hurt you??
It’s actually not bad to do it as long as your host machine has a static ip. Makes it easier to take a snapshot before you make major changes. Just be prepared with an extra router. If you have a family the second the Internet is not working you will be blamed.
Yeah, that’s reasonable
This not so much
Lol, I get blamed enough for DNS, I don’t need routing too
What’s a good router one can use for openWRT? I just so happen to need a new one. No expert mode for me.
I would just look at routers with the features you want and check to see if it’s compatible.
https://openwrt.org/toh/start
Thanks! Just to be sure, the router company becomes inconsequential when I install openwrt, or am I mistaken?
As in say I buy a linksys router and install openwrt, linksys can no longer spy on my traffic, so I shouldn’t worry about that, right?
Yeah. There’s a possibility that there is a backdoor built into the soc, but that would be nation state level stuff that would be extremely difficult to uncover.
Ok cool thanks, I’ll probably go with something on this list then. My other things I was looking at were the Turris Omnia and the Peplink B-one, but tbh a lynksys with openwrt will likely serve me fine.