We didn’t like the VPN videos out there on the internet - so we made our own! Its now available to watch on PeerTube at the link above!
Sorry to ask: can you include a summary?
I don’t often get time to watch videos, even short ones.
A VPN transfers trust from the ISP to a VPN provider
Encrypted DNS does not stop ISPs from seeing the ip addresses of the websites you visit
For anonymity use TOR
I was using a vpn for everything. It was slow, it took forever to connect, I was having issues with websites I have to use for my business blocking them.
It was great if I wanted to look at a geo locked website, or video. It worked when I sailed the high seas (theoretically, as no one has ever said otherwise to me).
For every day use it ended up being such a pain I stopped connecting to mine unless I needed it.
I literally have two machines running on always on VPNs, one my personal PC and another a home server were a torrent service is running, and have no such problems.
I think maybe the mistake you made was spending most of the time with it OFF and then turning it ON once in a while, whilst mine just goes ON as soon as I boot my machine and stays on.
Granted, I’m not using it for getting around geo-locked websites, I’m using it for having a bit more privacy and for safety when sailing the high seas so once in a while I have the opposite problem (that I’m blocked from accessing sites in my own country because the connections appear to be coming from a different country).
Does Icloud private relay work good enough for non-illegal activities?
I use something different for torrenting obvs.
Removed by mod
That is idiotic.
VPNs absolutely have their places.
But if you don’t trust your ISP, why would you trust your VPN service with all your internet data?
Because I trust my VPN more then my ISP. This is a pretty obvious and common answer.
That is a fair answer.
Though I would hesitate to use your trust in your own ISP and VPN as a blanket statement for trust with regards to other’s setup
Sure. Everyone needs to evaluate who or what they trust based on their own threat model.