this post was submitted on 26 Feb 2024
32 points (82.0% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54500 readers
507 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Don't do this.
It is a terrible idea.
Free services have negative interest in protecting user's privacy, they would mine the shit out of that data.
Since you are doing this from a company network and split tunneling is not 100% secure, this means that your company computer will send internal communications through the VPN, where it will be mined the shit out of.
Since you are talking about torrenting, even if you are just consuming small ammounts of data, don't be surprised if the VPN provider eill either block you immediately, or hand over suspicious logs to the police/media companies.
You claim to have permission to do this, I am pressing X to doubt, if you had proper permission to do this you would not need to use a free VPN, the company would either have the technical and legal infrastructure to deal with this, or they would provide you with a good paid VPN like Mullvad.
This sounds extremely sketchy to me, and unless I have a written and signed order to do this in this manner I would refuse to do this work, and even then I would want a written and signed order for the specific time I had to do it.
This keeps being said and I don't understand why people keep saying it. Split tunneling should be exactly as secure as your route table makes it, shouldn't it?
Sure, if you can guarantee that the specific program uses the tunnel for the specific connections required.
It is not uncommon for programs to to either not use the tunnel correctly or not use it at all.
While its nice when a program let's you pick the egress interface for its network traffic, split tunneling is still on the host os for handling its route table and making sure that's set up correctly. Like, were people setting up split tunnel networks where they were treating the vpn interface as a proxy, pointing the software at it, and just hoping for the best?