Skip to main content


I hate how the privacy services shove in your face the "unprotected" word


You disable the VPN, they show "unprotected", come on, I'm not really unprotected, why such a dramatic word, I just disabled the thing a little, I'm "disconnected" but it doesn't mean I'm actually unprotected, the same way it doesn't mean I'm actually protected if I'm using a VPN.
in reply to JohnDarlen

Mullvad uses the term "Disconnected" in their apps, and their website header says "Not using Mullvad VPN".

(I know that's probably not a good reason to switch providers, but they are really good in other ways too)

in reply to shrek_is_love

I just saw that on Proton VPN but I remember seeing other services forcing this "unprotected" word as if it was the end of the world.

"Please you need us look how you need us now you're unprotected holy shit"

in reply to JohnDarlen

It's just fear-based marketing, which I have a strong distaste for as well
in reply to JohnDarlen

This confused my parents too. They saw a sponsorship for some no-name VPN, with a bunch of scare tactics, and were afraid they would get hacked without a VPN. I had to explain that the VPN was only the entrance to the internet. We already have plenty of encryption in place with https. Only time I really "need" a VPN is for hotel/airport/mall public Wifi.
This entry was edited (1 day ago)
in reply to JohnDarlen

You'll know in about nine months, give or take, depending on when you went unprotected.
in reply to JohnDarlen

Virtual wire from your PC to the provider. Nothing more, nothing less. And btw, the encryption of the "wire" doesn't protect against online tracking (and https is already encrypted).
in reply to MonkderVierte

and https is already encrypted


But DNS is not, and even HTTPS is leaking info via the SNI

in reply to WhyJiffie

That's what i meant, the encrypted traffic doesn't help privacy.
in reply to MonkderVierte

that's just outright bullshit.

it already helps that most of the data in HTTPS traffic is encrypted, otherwise your network provider would see freely what user account do you use, to post what content, on what subforums.

encrypting all traffic on the wire helps additionally to hide what websites you visit (DNS and SNI in HTTPS) and what kind of other web services you use. your local ISP will only see an opaque stream of data to a single VPN company.

in reply to MonkderVierte

Virtual wire from your PC to the provider. Nothing more, nothing less.


also wrong. It's a virtual wire, that is significantly harder to be tapped, because signals on it are scrambled.

in reply to MonkderVierte

Au contraire:

A VPN, or virtual private network, helps protect your online privacy by encrypting your internet connection and masking your IP address, making it harder for others to track your browsing activity. It also allows you to bypass geographical restrictions, giving you access to content that may be blocked in your region.


The whole point of VPN is privacy.

in reply to MasterBlaster

youe internet connection is already encrypted if you are using https
in reply to surjomukhi

in reply to MonkderVierte

I keep seeing this but I don't understand. Does it not improve your privacy with respect to your ISP?
in reply to surewhynotlem

If your ISP tracks you, then yes; the VPN "tunnels" past the ISP. But keep in mind that the VPN provider can also sell your browsing history. And the ones suitable to work around DRM laws, usually don't have strict data protection laws.

The issue is, that a lot of VPN providers sell their service as a privacy service, with loads of superficial bullshit or false promises.

This entry was edited (1 day ago)
in reply to MonkderVierte

It sure is. You get privacy from your ISP, or the network operator of what you’re connected to. Thats why people famously use them for things like piracy. If VPNs weren’t private, privacy wouldn’t exist.
This entry was edited (17 hours ago)
in reply to Encrypt-Keeper

Not necessarily. For example if your browser is fingerprinting you towards the webpage, a VPN will be useless when it comes to privacy.
in reply to It_is_gaslighting

Yes necessarily. What a VPN does to protect your traffic flows from your ISP or network operator is not affected by browser fingerprinting. On the contrary, this is something VPNs explicitly help with. Since web traffic is almost always encrypted, the types of limited traffic analysis they can normally do, they wouldn’t be able to do if all your traffic is going through a VPN. (Snooping on your DNS queries, looking at your TLS SNI, analyzing packet sizes and such)

Additionally, not all traffic you’re trying to protect with a VPN even uses a web browser.

This entry was edited (10 hours ago)
in reply to JohnDarlen

It all depends on what you're supposed to be protected from. Vpns protect your Communications from being intercepted and keeps your location anonymous.

So you are in fact unprotected from being located identified and tracked. You are also unprotected from having your Communications intercepted by a man in the middle.

If you're on a public unsecured Wi-Fi network you are totally exposed. If you are on your own router connected through an isp, the ISP knows everything you're doing, and attaches your billing information to that data and uses it.

So I really don't think unprotected is a scare word. It is an accurate description of your situation.

in reply to MasterBlaster

VPNs don't prevent a device from announcing its real location. And they protect you from a MITM at the ISP but not at the VPN provider, so you just switch who you trust. VPNs also don't do anything to help with the browser fingerprinting that companies use to track you around the web. From the point of view of the services and sites you connect to, all a VPN does is change your IP address, and the IP address may not be a big part of how they track you in the first place. VPNs alone do not improve privacy much at all.

What VPNs do is shield your traffic metadata from inspection by the network hops between your client and the VPN provider (though the content is almost always enxrypted even without the VPN), and change your apparent location for any service that is exclusively using IP-based geolocation.

This entry was edited (1 day ago)
in reply to MasterBlaster

If you’re on a public unsecured Wi-Fi network you are totally exposed. If you are on your own router connected through an isp, the ISP knows everything you’re doing, and attaches your billing information to that data and uses it.


You don't need a vpn to protect yourself over a public wifi network. All modern website have HTTPS with certificates so the website can't get spoofed and no one knows what your doing on that website. Modern browsers will warn you before entering a website without https or a certificate. Using an encrypted DNS like nextdns further protects you so no one even knows what websites your visiting.

Ok I'm not 100% sure if using an encrypted DNS does fully protect you from outsiders finding out which website your visiting, hopefully someone can correct me if I'm wrong.

in reply to pineapple

The only problem I see with public wifi is the peer-to-peer nature of it. You no longer have the protection of a gateway if somebody is trying to be nefarious. They won't sniff https traffic, but might attempt to connect to open services like an unsecured listener for the cat feeder.

In that instance, locking down the internet connection with a VPN would prevent an attack.

in reply to Peffse

I've actually never really considered that. I guess all other apps also need to be secure or sandboxed or lack permissions to do anything although even then it seems like apps can just escalate permissions on there own without you doing anything.
in reply to JohnDarlen

What other terms could they use?
* Vulnerable
* Exposed
* In Danger
* At Risk
* Potentially Compromised
* Unmasked
* Uncovered
* Unhidden
* Discoverable
* Unpresentable
* Uncouth
* Unbecoming
* Indecarous (might be my favorite now)
* Indecent
* Immodest
* ...
This entry was edited (1 day ago)
in reply to Steve

They could just provide the facts: your connection is not protected by the VPN. The scaremongering is just marketing for the next renewal.
in reply to ilinamorato

not protected


Even better..."not connected".

Being on a VPN doesn't mean your connection is protected, necessarily.

in reply to otp

That could theoretically be misconstrued by some users as meaning "not connected" to any network, though. And explaining it might be a little wordy for a notification. Maybe "VPN disconnected" or something.
in reply to ilinamorato

True. Users are able to misconstrue things well beyond my imagination
in reply to Steve

All substantially less likely to make me think of condoms
in reply to JohnDarlen

What a nice device you have got here. Wouldn't it be a shame that something bad happened to you because you didn’t throttle your bandwidth or stopped paying your subscription on time?
This entry was edited (1 day ago)
in reply to JohnDarlen

If you’re using a VPN to protect the destination of your traffic from the prying eyes of your ISP or the state, then the VPN would absolutely be protecting it, and therefore when disconnected you are by definition unprotected.
in reply to JohnDarlen

ITT: a lot of ignorant laymen who don’t understand the first thing about how the internet works.