this post was submitted on 26 Feb 2024
32 points (82.0% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54565 readers
445 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

I want to try bitmagnet on the dev server at work (yes, we have permission to use it for personal reasons as long it's legal) but for obvious reasons it must be tunneled through a VPN.

Bitmagnet it's a local search engine that discovers content via DHT. It just asks peers for content, then when you come back the following month it should have found many interesting stuff

Problem is that from a network point of view it looks I want to download every single torrent ever made so I wouldn't want to have my workplace ip address associated with that.

Because the network traffic is minimal and for this content I don't care if the provider does data mining, I would like to use a free VPN with gluetun.

But I can't find a free one that works. From the officially supported only windscribe and proton have a free offer, but windscribe free doesn't have OpenVPN or wireguard, while proton VPN free blocks me immediately as soon as the program talks with other peers, even if I don't actually download anything.

So back to the question, which free VPNs are working with gluetun, someone has experience with that?

you are viewing a single comment's thread
view the rest of the comments
[–] Osa-Eris-Xero512@kbin.social 5 points 8 months ago (1 children)

split tunneling is not 100% secure

This keeps being said and I don't understand why people keep saying it. Split tunneling should be exactly as secure as your route table makes it, shouldn't it?

[–] stoy@lemmy.zip 4 points 8 months ago (1 children)

Sure, if you can guarantee that the specific program uses the tunnel for the specific connections required.

It is not uncommon for programs to to either not use the tunnel correctly or not use it at all.

[–] Osa-Eris-Xero512@kbin.social 1 points 8 months ago

While its nice when a program let's you pick the egress interface for its network traffic, split tunneling is still on the host os for handling its route table and making sure that's set up correctly. Like, were people setting up split tunnel networks where they were treating the vpn interface as a proxy, pointing the software at it, and just hoping for the best?