NOT Sponsored 😀 // Linux Basics for Hackers videos // Playlist: th-cam.com/play/PLhfrWIlLOoKOs-fjCPHdzD2icF2vORfwK.html // Viasat hack // TH-cam video: th-cam.com/video/-_cSuaEOXIw/w-d-xo.html // Occupy The Web SOCIAL // X: twitter.com/three_cube Website: hackers-arise.net/ // Article REFERENCE // www.hackers-arise.com/post/so-you-thought-your-vpn-was-keeping-you-safe-and-secure // Occupy The Web Books // Linux Basics for Hackers: US: amzn.to/3wqukgC UK: amzn.to/43PHFev Getting Started Becoming a Master Hacker US: amzn.to/4bmGqX2 UK: amzn.to/43JG2iA Network Basics for hackers: US: amzn.to/3yeYVyb UK: amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: th-cam.com/video/YJUVNlmIO6E/w-d-xo.html&pp=iAQB Mr Robot: th-cam.com/video/3yiT_WMlosg/w-d-xo.html&pp=iAQB Hackers Arise / Occupy the Web Hacks: th-cam.com/video/GxkKszPVD1M/w-d-xo.html&pp=iAQB // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal TH-cam: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:45 - Intro 02:19 - VPN’s don’t protect you 08:45 - As of 2024 VPS’s don’t keep data safe 11:51 - How do I stop a hacker? 15:03 - Consumer VPN’s and browser fingerprints 19:53 - Is a VPN safe with public wifi? 22:35 - Using multiple layers of defence 24:50 - Is Tor better than a VPN? 27:07 - Tor vs. VPN 30:03 - Outro vpn firewall fortinet cisco palo alto juniper hack hacker hacking cybersecurity virtual private network penetration testing ethical hacker starlink check point, heckpoint sophos watchguard vmware nord vpn proton vpn Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #vpn #cybersecurity #hack
would you please download a video explaining how to download GNS3 on VMware from MAC M1 with all details? The old way in your channel does not work with me I couldn't do it
@14:18 "fortinet is hacker's best friend " hahaha😂😂😂 you just nailed it. It will stay in people's mind for years, good job. 👍 Thanks to OTW and David sir for all the work you people put into. Bravo 👏💯
VPNs are like locking your car door. If someone really wants to get in, they’ll smash your window. But most thieves will bypass your car in favor of one that’s easier to break in to.
If the big kids wanna hack you, they're gonna do it. Other than that, a little money will buy credentials or a version of Pegasus, but are you saying these major corporations are recommending commercial VPNs for their employees? That's sketchy!
Very informative and ethical. Notice how nobody tried to advice any brands. Never trust other ytubers who make ''information'' about vpn and at the same time sell their ads. Do not trust also paid vpn, they sell your data too... or worse, since there is a payment method involved, can be worse.
OTW - "If a product/service is for free then you agent the customer, you are the product" That is cold and a badass but true line because with some services the free versions do nothing so companies use them to test where needs to be upgraded and whatever else
@@RDXGaming-ij3pn Yes! We are the product if we use TH-cam for free, we get advertisements in videos. If you pay for TH-cam's premium, you do not get advertisements in videos. Adblockers disable youtube adverts. TH-cam is owned by google and google is trying to block adblockers from blocking their advertisements. So if you are using an adblocker you are making youtube get less money
VPNs are still safe for normal people doing normal things. If you're being cased by the feds, of course IP masking won't be enough. If you're trying to be private and not be anonymous, a VPN is still fine. Just pick your VPN provider carefully. Mullvad is my personal choice as an american.
What about PiVPN? Wouldn't it be best to build and maintain your own VPN with a cloud service provider? Just a question. Thanks in advance @@davidbombal
@Ire-b3t Proton VPN are good then others VPN I had Surfshark and Proton, I was successful to connect with the free Proton then the Surfshark application but the free Proton had limitations like speed and country limit and the number of connections, Surfshark had an issue most locations are virtual and sometimes it will not connect at all with the app you need to use openvpn application with config file .
I'm just beginning a project on researching and pilot testing various ZTNA solutions, and this has helped immensely to understand a bit more about the depth of security I should be considering. Thanks to you both!
This is why a pihole DNS server is important as well. Sophos firewall. Self hosted Open VPN servers. Tor browsers. Non-persistent portable OS like Qubes.
Cool video David. I would've liked to hear you guys discuss pros and cons of hosting your own wireguard or openvpn server instead of a paid service vpn
LOL - yeah, TH-cam getting pretty good at the timing and subject of ads these days - on my YT they even suspend the video perfectly at points of suspense!
Just because your house is vulnerable to robbers, doesn't mean you should be living in the streets. Better use a vpn which improves your privacy than not using at all.
Thank you David for another awesome video! I would really appreciate the video where you show how to build your own safe home network using hardware firewalls and other essential devices, on a budget. I plan to build one for safety and educational purposes soon. 🤓
I would like to hear more about the pros/cons of self-hosting a security and privacy solution. It’s not that hard to setup a VPS at a data center and tunnel back home via Wireguard. That same VPS can serve as VPN endpoint for mobile use.
most people have fast internet at home now. Run a Wireguard VPN on a raspberry Pi or similar device for all your personal needs away from home. No issues with streaming netflix etc as it’s your own dynamic home IP address. Very small chance of being hacked unless an attacker is directly targeting you. I wouldn’t use any paid VPN service these days.
8 minutes in this guy's claiming skids can hack vpns and decrypt your data. The decryption part is total BS. They might be able to see who's coming and going to places but they can't see what you're doing because there's no way they can crack the encryption. How am I meant to keep watching and take this guy seriously after that BS claim? Also he bangs on about browser fingerprinting. Who TF doesn't use a fingerprinting blocking browser with spoofing capabilities these days. Just a person who likes the sound of his own voice it seems.
My neighbor is capturing my packets, they want to completely shutoff my internet so I cannot work remotely. VPN is a must for me. They were able to ask my ISP to cut my internet, so wired / fiber connection is no longer an option. Do you think starlink is the best option now, or it can easily be captured and deny my internet?
In the end, the conclusion from everyone's videos is that vulnerabilities are everywhere, so we can't do anything. Hearing all this can be frustrating because if we can't do anything, then why are we even trying to achieve privacy ?
Wait, you're telling me that FireVPN, DragonVPN, SmartVPN, DarkVPN, FunkyVPN, HairyVPN, SleepyVPN, ShadowVPN, SuperVPN, MountainVPN, PeopleVPN, DataVPN, VpnVpn and all those 1000 others are NOT actually secure but just a money making scheme?! How could I have known?!
With the Fortinet dings, I agree in the SSL realm. IPSec has been a lot lesser of an issue. Correct a security company should be secure at their code level. I am curious to see the analysis on ZTA proxy/destinations.
Tor - I've just started using the Tor bridges via Tor and Brave browsers and it speeds it up significantly - connects in a couple of seconds, rendering is decent, no CDN bot challenge alerts. Better on mobile too although not as noticeably as desktop.
Always better videos and specialy when OTW is here with his great advises thx for both of you, just to ask you David to do some videos about the future of networking with quantum computing
In the 90's was in Coast Guard, remote site, back then we ran firewalls. First purchased with government credit card and other was with cash, back then infiltrators( hacker's ) had access to our purchases and social engineered attempts to attack, would delay progress and hopefully make them move to easier targets.
I like to think of it as wearing body armor. Can you still get taken down? Yeah, but it's better than nothing. The truth is, you are never fully protected, and someone will always make a zero day!
I've heard of people starting up a TOR exit node, and getting approached by law enforcement agencies that told them to get their butt off there. That leads me to believe that MANY TOR nodes are indeed being controlled by law enforcement and your anonymity is a facade.
I wouldn't use a third party VPN, only VPN I'd use is when I'm hosting the VPN server and also that I set up my own CA with certificates for the VPN server. Then it's of course important to not reveal which kind of VPN I'm using, even though it's security by obscurity it will at least limit the exposure more. Of course it comes with other headaches and risks. The VPN and firewall risks is why I prefer to work physically at my local site rather than remotely. I also prefer to segment the networks if I can. Another concern I have is how secure Azure Virtual Desktop is. This is what my workplace recommends instead of VPN.
Always enjoy watching you two 🙌You hav given a legit advise for corporate security but what as an individual can I do to protect myself from hackers/data collection without using TOR as a daily browser since VPNs are not legit tools? 27:41 if TOR is free are we the product? 🤣
@@davidbombalwhy would the paid ones of names like the one mentioned, have a different mechanism?🤔I don’t know much about those things but even the paid ones seem to function under the same principle
i think VPN is used primarily to unlock services that are blocked in some locations, what do you think about Tor browser ? is it possible to locate people using it ?
I had to protect my data from these hackers.If the Scam callers calling me and they asked for my personal information and the Scammers got hacked my information when I see it,I would have help the police to trace the call and arrest these Scammers.Yeah,I just want the scammers to be arrested.
At very basic level doesn't a VPN at least mask the websites and content you are viewing from local scanning? What is the best firewall available at the consumer or very small business level?
OK that was kind of funny that a NordVPN ad came up in the middle of this video, where the guest is denouncing how crappy the VPN vendor's software is. As an ex-cyber guy myself, every time a family member brings up news about cyber hacks I just respond that it's because of exactly what OTW says. None of these companies care about quality software, just sales. They don't practice safe computing. They don't follow secure coding standards that we've know about for years. The world is just full of crappy software, and not enough accountability or incentive to fix it.
With HTTPS being so prevalent and IMAP using TLS, the likelihood of a MITM being successful makes using public Wi-Fi perfectly fine. A VPN doesn't really provide much benefit in those cases. The risk communicated about this is highly over stated.
An Indian cyber crime investigator keeps mentioning in a podcast that if he gets someone's digital footprint, even if that digital footprint is anonymous, he can still track down the user by analyzing patterns. He doesn't provide much information so that criminals don't benefit, but he might be referring to browsing fingerprints.
what about if you use a vpn connect to a location with data retetion laws that will prevent your activity to be recorded (e.g. things that happpened with mullvad in sweden)?
IT technicians don't fall under public servants? I mean cellphones & laptops/desktop run the world. And god forbid someone's gaming console goes on the fritz, its like the end of the world. And its dangerous work, no telling what you'll see on people's hard drives. I mean what you do but I don't wanna see it. Good topic to bring to folks attention especially in this day and age when people focus so much on themselves, they forget other people even exist let alone have feelings. Its sad but one day the pendulum will swing back. Let us hope it's not a day too late. Public servants, I salute your efforts, your humanity, your sacrifices. Thank you!
Curious Cisco is not shown in the the list with vulnerabilities. There are plently, do not get me wrong. Products are rushed to market. And many companies retire early their products instead of offering patching their products.leaving clients on the road
VPNs aren't for security, they're for convenience. I am an American living in another country. Being able to launch a VPN and be in the USA makes my life easier since a bunch of sites (including my former statea tax portal) are blocked outside the USA.
What if I get my own tor node? Is there a way to bind me to it as it's the first cape of security that I have to trust? Trying to avoid those Intelligence agencies nodes
I dont get how hacker could get fingerprints, since it collected and stored by different companies like google, microsoft etc. I mean, stuff like fingerprints should be not public information. Am I missing something ?
i got expressvpn on my main computers and i also have mulvad vpn on my routeur so if expressvpn failed on pc i have a kill switch on routeur with mulvad is that overkill ? or more safe
a site to site VPN works differently than a vlient VPN. Client VPN ist mostly SSL-VPN where site to site is based on IPsec VPN where the traffic is encrypted and you use like SHA512. Just make sure you use modern encryption and not like 3DES SHA1 Diffie Hellman 2. you can also do client VPN with IPsec. Fortinet will delete the SSL-VPN functionality on lower-end firewalls with less RAM when you update the firmware to 7.6
A VPN is still an added layer of protection. While I don't like how VPNs advertise their services they're still a valuable added layer of protection when you take them for what they are (and nothing more).
5:46 easy, they have an excellent PR and Ads Department. That’s how they start in business. Well probably that and I wonder how many of their clients also has breaches, but signed an NDA.
I only trust Mulvad or Proton VPN with my data. Most of the other VPNs are basically owned by the same 3 companies that want to sell your data or they keep logs of everything that you do.
would you please download a video explaining how to download GNS3 on VMware from MAC M1 with all details? The old way in your channel does not work with me I couldn't do it
This is why you use throw away dedicated devices for anything malicious. Expect everything on a computer connected to the internet to be public knowledge.
VPNs work when used correctly. They provide an encrypted tunnel connection between two points. Anything before or after those points is clear text. Notice the NSA/CIA have been quiet about VPNs? I wonder where they are, before or after the tunnel?
Security is about layers and it's about not leaving digital footprints on the web because it's being vacuumed up forever whether its encrypted or not. That is why I use all my layers including a no logs complete anonymity VPN. It's not perfect and I'm not claiming it is, but I want as little out there about me as possible. That is why I do all that I do. I don't know how anything is going to be used against me in future so why not leave very little out there for that!
The Supreme Court recently just ruled that it’s unconstitutional for the FBI to use back doors so a VPN may become safer in the US depending on the scenario
NOT Sponsored 😀
// Linux Basics for Hackers videos //
Playlist: th-cam.com/play/PLhfrWIlLOoKOs-fjCPHdzD2icF2vORfwK.html
// Viasat hack //
TH-cam video: th-cam.com/video/-_cSuaEOXIw/w-d-xo.html
// Occupy The Web SOCIAL //
X: twitter.com/three_cube
Website: hackers-arise.net/
// Article REFERENCE //
www.hackers-arise.com/post/so-you-thought-your-vpn-was-keeping-you-safe-and-secure
// Occupy The Web Books //
Linux Basics for Hackers:
US: amzn.to/3wqukgC
UK: amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: amzn.to/4bmGqX2
UK: amzn.to/43JG2iA
Network Basics for hackers:
US: amzn.to/3yeYVyb
UK: amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: th-cam.com/video/YJUVNlmIO6E/w-d-xo.html&pp=iAQB
Mr Robot: th-cam.com/video/3yiT_WMlosg/w-d-xo.html&pp=iAQB
Hackers Arise / Occupy the Web Hacks: th-cam.com/video/GxkKszPVD1M/w-d-xo.html&pp=iAQB
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
TH-cam: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:45 - Intro
02:19 - VPN’s don’t protect you
08:45 - As of 2024 VPS’s don’t keep data safe
11:51 - How do I stop a hacker?
15:03 - Consumer VPN’s and browser fingerprints
19:53 - Is a VPN safe with public wifi?
22:35 - Using multiple layers of defence
24:50 - Is Tor better than a VPN?
27:07 - Tor vs. VPN
30:03 - Outro
vpn
firewall
fortinet
cisco
palo alto
juniper
hack
hacker
hacking
cybersecurity
virtual private network
penetration testing
ethical hacker
starlink
check point,
heckpoint
sophos
watchguard
vmware
nord vpn
proton vpn
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#vpn #cybersecurity #hack
Use MASQ
would you please download a video explaining how to download GNS3 on VMware from MAC M1 with all details? The old way in your channel does not work with me I couldn't do it
what do u say to myst vpn and options like i2p
@14:18 "fortinet is hacker's best friend " hahaha😂😂😂 you just nailed it. It will stay in people's mind for years, good job. 👍 Thanks to OTW and David sir for all the work you people put into. Bravo 👏💯
VPNs are like locking your car door. If someone really wants to get in, they’ll smash your window. But most thieves will bypass your car in favor of one that’s easier to break in to.
i agree spot on
If the big kids wanna hack you, they're gonna do it. Other than that, a little money will buy credentials or a version of Pegasus, but are you saying these major corporations are recommending commercial VPNs for their employees? That's sketchy!
The problem is, many people will say, ok, everything is unsafe, there's nothing todo, so I do nothing.
ಗಮ್ಮತ್ತು 😊
Hate this mindset
@@pedrosmith4529 this is not true. If you trust your security to a product, it is like saying walls are unsafe as prisoners find a way to walk around.
Yeah, but I found out I could actually touch grass bro!
There should be a public holiday worldwide, no internet day, literally shut it down for a day
That is what the majority of privacy shills are pushing.
Very informative and ethical. Notice how nobody tried to advice any brands. Never trust other ytubers who make ''information'' about vpn and at the same time sell their ads. Do not trust also paid vpn, they sell your data too... or worse, since there is a payment method involved, can be worse.
Unless they have zero knowledge like Proton products.
OTW - "If a product/service is for free then you agent the customer, you are the product"
That is cold and a badass but true line because with some services the free versions do nothing so companies use them to test where needs to be upgraded and whatever else
ya, youtube also free so we all are product
@@RDXGaming-ij3pn Yes! We are the product if we use TH-cam for free, we get advertisements in videos. If you pay for TH-cam's premium, you do not get advertisements in videos. Adblockers disable youtube adverts. TH-cam is owned by google and google is trying to block adblockers from blocking their advertisements. So if you are using an adblocker you are making youtube get less money
That's outdated thinking. You're always the product.
VPNs are still safe for normal people doing normal things. If you're being cased by the feds, of course IP masking won't be enough. If you're trying to be private and not be anonymous, a VPN is still fine.
Just pick your VPN provider carefully. Mullvad is my personal choice as an american.
What do u think 🤔 about proton VPN I use that ‽
I use Proton VPN and recommend them.
What about PiVPN? Wouldn't it be best to build and maintain your own VPN with a cloud service provider? Just a question. Thanks in advance @@davidbombal
Proton vpn offers free vpn. Well wouldn’t it be reasonable to say you are the product not the customer.
@Ire-b3t Proton VPN are good then others VPN I had Surfshark and Proton, I was successful to connect with the free Proton then the Surfshark application but the free Proton had limitations like speed and country limit and the number of connections, Surfshark had an issue most locations are virtual and sometimes it will not connect at all with the app you need to use openvpn application with config file .
I'm just beginning a project on researching and pilot testing various ZTNA solutions, and this has helped immensely to understand a bit more about the depth of security I should be considering. Thanks to you both!
This is why a pihole DNS server is important as well. Sophos firewall. Self hosted Open VPN servers. Tor browsers. Non-persistent portable OS like Qubes.
+ proxychains with refreshing brand new proxies on a list with kali-whoami etc etc. Don't forget WebRTC leak ;)
Yo forgot one thing, Temple OS.
@@JuanPvbl02 XD
yeah
@@JuanPvbl02 😭
Cool video David. I would've liked to hear you guys discuss pros and cons of hosting your own wireguard or openvpn server instead of a paid service vpn
Video: don’t use VPN - TH-cam: hey, let’s play a unskippable nordVPN ad 😅
LOL - yeah, TH-cam getting pretty good at the timing and subject of ads these days - on my YT they even suspend the video perfectly at points of suspense!
Great stuff! Admire both of you. Cheers
Thank you!
Love the OTW videos, I could listen to his lessons all day!
I think David and a hacker is the same person 😂
😂
David vs A.I David (trained by David's contents)
😂
Which one is his telephone manner and which is his natural?
Just because your house is vulnerable to robbers, doesn't mean you should be living in the streets. Better use a vpn which improves your privacy than not using at all.
Thank you David for another awesome video!
I would really appreciate the video where you show how to build your own safe home network using hardware firewalls and other essential devices, on a budget.
I plan to build one for safety and educational purposes soon. 🤓
Man, you are so honest, extremely grateful!
I would like to hear more about the pros/cons of self-hosting a security and privacy solution. It’s not that hard to setup a VPS at a data center and tunnel back home via Wireguard. That same VPS can serve as VPN endpoint for mobile use.
most people have fast internet at home now. Run a Wireguard VPN on a raspberry Pi or similar device for all your personal needs away from home. No issues with streaming netflix etc as it’s your own dynamic home IP address. Very small chance of being hacked unless an attacker is directly targeting you. I wouldn’t use any paid VPN service these days.
YES!!!! OTW!!!!! I can finally afford his courses! TY OTW and DAVIE!!!!!
I run all my traffic thru a copy machine in an AT&T building, into a VPN, connected to McDonald's ice-cream machine........they ain't caught me yet😝
The same people who think a VPN makes you anonymous and private, probably also thought that private browsing in chrome was private. 😅
Good job David. We hope you consider dropping an episode about Monero, hopefully engaging the Monero community. Big thanks.
it's always great to watch when OTW comes on because we can learn a lot. thanks for this David
keep up the great work
can you make a video about services like NextDNS and tell us how safe/unsafe they are?
8 minutes in this guy's claiming skids can hack vpns and decrypt your data. The decryption part is total BS. They might be able to see who's coming and going to places but they can't see what you're doing because there's no way they can crack the encryption. How am I meant to keep watching and take this guy seriously after that BS claim? Also he bangs on about browser fingerprinting. Who TF doesn't use a fingerprinting blocking browser with spoofing capabilities these days. Just a person who likes the sound of his own voice it seems.
👏
My neighbor is capturing my packets, they want to completely shutoff my internet so I cannot work remotely. VPN is a must for me. They were able to ask my ISP to cut my internet, so wired / fiber connection is no longer an option. Do you think starlink is the best option now, or it can easily be captured and deny my internet?
In the end, the conclusion from everyone's videos is that vulnerabilities are everywhere, so we can't do anything. Hearing all this can be frustrating because if we can't do anything, then why are we even trying to achieve privacy ?
'Privacy' is a long d3@d concept. It d13d when everyone moved their lives onto the net in the first place.
Wait, you're telling me that FireVPN, DragonVPN, SmartVPN, DarkVPN, FunkyVPN, HairyVPN, SleepyVPN, ShadowVPN, SuperVPN, MountainVPN, PeopleVPN, DataVPN, VpnVpn and all those 1000 others are NOT actually secure but just a money making scheme?! How could I have known?!
If the NSA are after you, it's best to use homing pigeons 😅
Tor over VPN when you want to hide the Tor usage (because few people use TOR, they can geolocate you very very quickly)
With the Fortinet dings, I agree in the SSL realm. IPSec has been a lot lesser of an issue. Correct a security company should be secure at their code level. I am curious to see the analysis on ZTA proxy/destinations.
Tor - I've just started using the Tor bridges via Tor and Brave browsers and it speeds it up significantly - connects in a couple of seconds, rendering is decent, no CDN bot challenge alerts. Better on mobile too although not as noticeably as desktop.
thank you for this video! both of u are amazing.
Always better videos and specialy when OTW is here with his great advises thx for both of you, just to ask you David to do some videos about the future of networking with quantum computing
In the 90's was in Coast Guard, remote site, back then we ran firewalls. First purchased with government credit card and other was with cash, back then infiltrators( hacker's ) had access to our purchases and social engineered attempts to attack, would delay progress and hopefully make them move to easier targets.
I like to think of it as wearing body armor. Can you still get taken down? Yeah, but it's better than nothing.
The truth is, you are never fully protected, and someone will always make a zero day!
I've heard of people starting up a TOR exit node, and getting approached by law enforcement agencies that told them to get their butt off there. That leads me to believe that MANY TOR nodes are indeed being controlled by law enforcement and your anonymity is a facade.
everythings a honeypot, and they want their cuts.
It’s possible I’ve met OTW irl… in unrelated context. If it’s who I think it is, we had a conversation about commodore64 being sentimental/nostalgic.
Fortinet SSL VPN is vulnerable but what about Site to Site IPSEC VPN tunnels on fortinet? Are they vulnerable too?
It would've been nice if he elaborated more on browser fingerprinting.
I wouldn't use a third party VPN, only VPN I'd use is when I'm hosting the VPN server and also that I set up my own CA with certificates for the VPN server.
Then it's of course important to not reveal which kind of VPN I'm using, even though it's security by obscurity it will at least limit the exposure more.
Of course it comes with other headaches and risks.
The VPN and firewall risks is why I prefer to work physically at my local site rather than remotely. I also prefer to segment the networks if I can.
Another concern I have is how secure Azure Virtual Desktop is. This is what my workplace recommends instead of VPN.
Always enjoy watching you two 🙌You hav given a legit advise for corporate security but what as an individual can I do to protect myself from hackers/data collection without using TOR as a daily browser since VPNs are not legit tools? 27:41 if TOR is free are we the product? 🤣
Curious what OTW would say about a self hosted OpenVPN or Wireguard connection.
I wish he talked about Mullvad some!
Where tf. is Nord VPN ad
😂
🤣🤣🤣🤣🤣🤣
@@davidbombalwhy would the paid ones of names like the one mentioned, have a different mechanism?🤔I don’t know much about those things but even the paid ones seem to function under the same principle
Interesting...🤔 Securing to use the Internet is a challenge. Thank you for the information!
Edit: What about end to end encryption (E2EE)?
i think VPN is used primarily to unlock services that are blocked in some locations, what do you think about Tor browser ? is it possible to locate people using it ?
I had to protect my data from these hackers.If the Scam callers calling me and they asked for my personal information and the Scammers got hacked my information when I see it,I would have help the police to trace the call and arrest these Scammers.Yeah,I just want the scammers to be arrested.
What about roll-your-own VPN like Algo Trail-of-Bits?
At very basic level doesn't a VPN at least mask the websites and content you are viewing from local scanning? What is the best firewall available at the consumer or very small business level?
thank you David and OTW ❤
OK that was kind of funny that a NordVPN ad came up in the middle of this video, where the guest is denouncing how crappy the VPN vendor's software is. As an ex-cyber guy myself, every time a family member brings up news about cyber hacks I just respond that it's because of exactly what OTW says. None of these companies care about quality software, just sales. They don't practice safe computing. They don't follow secure coding standards that we've know about for years. The world is just full of crappy software, and not enough accountability or incentive to fix it.
aint this the truth
With HTTPS being so prevalent and IMAP using TLS, the likelihood of a MITM being successful makes using public Wi-Fi perfectly fine. A VPN doesn't really provide much benefit in those cases. The risk communicated about this is highly over stated.
An Indian cyber crime investigator keeps mentioning in a podcast that if he gets someone's digital footprint, even if that digital footprint is anonymous, he can still track down the user by analyzing patterns.
He doesn't provide much information so that criminals don't benefit, but he might be referring to browsing fingerprints.
what about if you use a vpn connect to a location with data retetion laws that will prevent your activity to be recorded (e.g. things that happpened with mullvad in sweden)?
So as a common person would a local VPN on a device like Adguard be better than say NordVPN?
Wish he commented on the most popular, non-free choices but I can understand why he didn’t
IT technicians don't fall under public servants? I mean cellphones & laptops/desktop run the world. And god forbid someone's gaming console goes on the fritz, its like the end of the world. And its dangerous work, no telling what you'll see on people's hard drives. I mean what you do but I don't wanna see it.
Good topic to bring to folks attention especially in this day and age when people focus so much on themselves, they forget other people even exist let alone have feelings. Its sad but one day the pendulum will swing back. Let us hope it's not a day too late. Public servants, I salute your efforts, your humanity, your sacrifices. Thank you!
Thank you so much for important information
Is it all about vulnerabilities in Fortnite OS?
Curious Cisco is not shown in the the list with vulnerabilities. There are plently, do not get me wrong. Products are rushed to market. And many companies retire early their products instead of offering patching their products.leaving clients on the road
Who will be interested in CCNA course after?!😂
VPNs aren't for security, they're for convenience. I am an American living in another country. Being able to launch a VPN and be in the USA makes my life easier since a bunch of sites (including my former statea tax portal) are blocked outside the USA.
Does using a virtual machine combine with VPN help?
if you want some good lvl of anonymity try whonix on virtual machine with a set of good proxy
What if I get my own tor node? Is there a way to bind me to it as it's the first cape of security that I have to trust? Trying to avoid those Intelligence agencies nodes
I dont get how hacker could get fingerprints, since it collected and stored by different companies like google, microsoft etc. I mean, stuff like fingerprints should be not public information. Am I missing something ?
If you use tor would that stop browser finger printing ?
I bought two of OTW's books. They are very good.
Thnx David and master otw ❤
What is Orbot? Is it a VPN or is it Tor ?
Thanks OTW, David
Fbi Ai will find you if they want it to
just make your own VPN🚀
Still need software for it which can still be vulnerable
@@throwhammer Hey, you can always that open source vpn code, the one with the built in back door that no one checks for ;-)
😅😅
yeah rent the VPS\VM using your google\microsoft account and your mom's credit card
How do I get my C64 to connect to it? I would hate for someone to hack me
Thank you!
i got expressvpn on my main computers and i also have mulvad vpn on my routeur so if expressvpn failed on pc i have a kill switch on routeur with mulvad is that overkill ? or more safe
NOT Sponsored. Proceeds to promote the books lol
not sponsored by any vpn boy,
@@nittrana-hq7du "Not sponsored by OTW, no I'm kidding... " then proceeds to promote OTW's books kiddo
Hello what about Vpn site to site et Site to point (with firewalls Forti, Pfsense and others ?)
a site to site VPN works differently than a vlient VPN. Client VPN ist mostly SSL-VPN where site to site is based on IPsec VPN where the traffic is encrypted and you use like SHA512. Just make sure you use modern encryption and not like 3DES SHA1 Diffie Hellman 2. you can also do client VPN with IPsec. Fortinet will delete the SSL-VPN functionality on lower-end firewalls with less RAM when you update the firmware to 7.6
Isn't this an older video?
Problem with TOR that internet is very slow and can't really download much on it
David what about Norton VPN and services?
A VPN is still an added layer of protection. While I don't like how VPNs advertise their services they're still a valuable added layer of protection when you take them for what they are (and nothing more).
love this series ❤
What site was he viewing the vulnerabilities from
5:46 easy, they have an excellent PR and Ads Department. That’s how they start in business. Well probably that and I wonder how many of their clients also has breaches, but signed an NDA.
I only trust Mulvad or Proton VPN with my data. Most of the other VPNs are basically owned by the same 3 companies that want to sell your data or they keep logs of everything that you do.
I like Proton as they are zero knowledge.
This channel could do a lot better at help the average person spot and defend against hacks. It does plenty for helping hackers break in.
This is embarrassing. If that guys a hacker then so am I.
would you please download a video explaining how to download GNS3 on VMware from MAC M1 with all details? The old way in your channel does not work with me I couldn't do it
How about VPN with 2FA? That's something from corporative segment.
Waiting for your video on DeepSeek
This is why you use throw away dedicated devices for anything malicious. Expect everything on a computer connected to the internet to be public knowledge.
... In 1 video you recommend Proton VPN, in other video you say VPN help you. xD Confusion is real.
I use Proton VPN - did you watch the full video where I asked the question about about using a VPN on a public wifi etc?
spooky
WELCOME BACK OTW WE ARE ALL WAITING FOR YOUR SUPED VIDEO
Tor, disposable locally hosted VPN if needed, DNS Proxy-chain, Tales. NOT ON HOST OS
And why is FTNT near all time high now?
VPNs work when used correctly. They provide an encrypted tunnel connection between two points. Anything before or after those points is clear text. Notice the NSA/CIA have been quiet about VPNs? I wonder where they are, before or after the tunnel?
VpN never been security by himself.
Security is about layers and it's about not leaving digital footprints on the web because it's being vacuumed up forever whether its encrypted or not. That is why I use all my layers including a no logs complete anonymity VPN. It's not perfect and I'm not claiming it is, but I want as little out there about me as possible. That is why I do all that I do. I don't know how anything is going to be used against me in future so why not leave very little out there for that!
Nothing is 100% Safe against Hackers
could a vpn of some antivirus be the same?
The Supreme Court recently just ruled that it’s unconstitutional for the FBI to use back doors so a VPN may become safer in the US depending on the scenario
Do you have the case name for that?