• 0 Posts
  • 138 Comments
Joined 7 months ago
cake
Cake day: October 20th, 2025

help-circle



  • Wow that sounds pretty Draconian. I would not travel without a personal phone, after all the trip is not 100% work time. I’d bring a personal burner, not my real phone, but I’d bring something. I don’t want my work to listen in on all personal comms while I’m there. I mean if they want me to leave a personal device in the hotel ok but not bringing it at all?

    And throwing my luggage and clothes away? Over my dead body.

    Of course with any work issued stuff they can do whatever they want. But not my personal things.

    I would really refuse a trip under such conditions, or refuse the conditions themselves.











  • Honestly, I don’t really care about that. Yes it uses quantum-sensitive protocols like AES but honestly, who with a quantum computer is either going to:

    • Record all my traffic to decode it 10 years later, knowing they will also have to break SSL on top of that!
    • Already has a quantum computer or a huge datacenter for paralellisation right now meaning they are the NSA and if they wanna spy on me they are going to anyway. And really if someone has such a datacenter they will use it for AI which is more profitable.

    For my threat model the threat of my VPN crypto being broken just isn’t important right now especially in my VPN usecase which is already low-importance stuff. There’s nothing valuable or personal in that traffic. The only reason I use the VPN is to do torrents really. If they want to grab a few torrenters and make an example out of them it’s much easier to grab a few that are not using any VPN. There’s still loads of people torrenting directly on their bare home IP.

    It’s like the saying of the two guys running from the bear. One says to the other: “We’re not gonna outrun him!”. The other says: “Doesn’t matter, I only have to outrun you”. Not being the easiest catchable is enough protection.






  • Just the same as other VPNs, just different protocol.

    It’s a regular point to point VPN just like wireguard and ipsec. Based on openssl. So you have a client and it connects to a single server. You can also connect a network to another network but usually you use a dedicated router for it. Only if you connect individual clients would you use an app.

    There’s other VPNs these days which are substantially different, called Mesh or Overlay VPN. These are ones like tailscale and zerotier. They are different in usage because each client can talk together independently. This means even on a shared network each client will have the VPN app. It’s used more for personal networks, not really private anonymous access. For those you explicitly don’t want to talk to other clients so the usecase makes for different tech. For this reason anonymous VPN providers never use mesh tech.

    I use both myself. OpenVPN for torrents etc. And tailscale for connecting to my home stuff from my phone and laptop.

    But OpenVPN is a very classical VPN type.


  • It’s one of the many VPN protocols. Wireguard is the current favourite.

    So in other words, if you don’t specifically need openvpn it won’t matter to you. Wireguard is good too.

    The thing is that openvpn has been around a lot longer so it has more support in things like routers. For me that matters because I have a separate vlan that’s connected via a router to my main network.