• CAVOK@lemmy.worldOPM
      link
      fedilink
      English
      arrow-up
      6
      ·
      1 year ago

      You don’t have to. You can audit the code yourself and build it from scratch. Most won’t. But you can.

        • CAVOK@lemmy.worldOPM
          link
          fedilink
          English
          arrow-up
          6
          ·
          1 year ago

          True, but you can. For vpn you have to trust them. There is no other choice.

          If you can’t read code yourself you can pay a number of companies some money to do the audit for you. Or you can learn to code.

          You can’t learn to know how the vpn logs data.

          But I get you. Most of us just put our trust in another entity.

    • alvvayson@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      The trust model is totally different.

      With a VPN you know the VPN dudes can compromise your security and you have to trust the specific guys hosting your VPN and also trust their OpSec. The failure mode is quite realistic.

      With I2P, and Tor you can trust that anyone in the world can audit the code. Including the highly knowledgeable people who know this stuff.

      The failure mode is very low and in reality depends on highly complex zero day vulnerabilities that can only be effectively exploited by a few nation-states, if they actually even have one.

      That said, a VPN is lower hassle and probably good enough for most purposes.