If you like DNray Forum, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...

 

Provider Violating Confidentiality?

Started by Nealiaple, Oct 18, 2023, 06:23 AM

Previous topic - Next topic

NealiapleTopic starter

Hello there!

I recently purchased an unlimited VPN service from a well-known hosting provider that is popular within certain circles. I used the VPN to access torrents and downloaded both an operating system and a few albums. However, today I received a message from the hosting provider informing me that they had detected my torrent usage on their VPN service and as a result, they have blocked my order. This situation has left me puzzled, so I reached out to them via chat to inquire about how they discovered my activities. Their response was that they do not keep any logs, but they received a complaint from copyright holders regarding the content I downloaded, and they also possess additional technologies that allow them to detect torrent usage.

This raises the question of the promised confidentiality. I must admit that I am not well-versed in these technologies. My kind fellow users, how is it possible for the provider to claim that they don't retain any logs, yet possess detailed knowledge of my resource usage? Does this mean that the provider can easily monitor all my internet traffic, including personal information such as usernames, passwords, and bank details? If the answer is yes or even maybe, then what should be done in such a situation?
  •  

ApekNiltdielt

In this situation, it's important to understand the distinction between a VPN service that claims to have a "no-logs" policy and the ability to monitor your internet traffic. While some VPN providers advertise that they don't keep logs of user activities, it doesn't necessarily mean they can't monitor or detect certain types of traffic.

In this case, the hosting provider claimed to have received a complaint from copyright holders regarding your torrent usage. It's possible that they used technologies specifically designed to identify torrent traffic, such as deep packet inspection, which can help distinguish between different types of data packets. This could explain how they were able to detect your torrent activities.

However, it's worth noting that just because they can detect torrent usage doesn't necessarily mean they can see all of your internet traffic, including personal information like usernames, passwords, or bank details. A VPN, when properly set up, should encrypt your internet connection, making it difficult for anyone, including the VPN provider, to access your sensitive information.

If you have concerns about your privacy and the use of VPN services, you may want to consider switching to a different provider that is known for prioritizing user privacy and security. Look for reputable VPN services that have been independently audited or have a strong track record of protecting customer privacy.

Additionally, if you engage in activities like downloading copyrighted content through torrents, it's important to note that even with a VPN, you may still run the risk of receiving complaints or legal action from copyright holders. Engaging in such activities can violate copyright laws, irrespective of using a VPN service.

When it comes to VPN providers, it's important to understand that there is a wide range of offerings available in the market. Some providers may indeed prioritize user privacy and security, while others may not be as reliable. Here are a few factors to consider when evaluating VPN services:

1. Privacy Policy: Carefully review the provider's privacy policy to understand what kind of data they collect, how long they retain it, and how they handle user information. Look for providers that have clear and transparent policies, especially regarding logging user activity.

2. No-logs Policy: While many VPN providers claim to have a "no-logs" policy, it's essential to look for ones that have been independently audited or have a strong reputation for upholding this policy.

3. Jurisdiction: Consider the jurisdiction in which the VPN provider operates. Opting for a provider based in a country with strict privacy laws can offer better protection for your data.

4. Encryption and Protocols: Check if the VPN provider offers strong encryption protocols, such as OpenVPN or WireGuard. These protocols help secure your internet traffic and protect against potential eavesdropping.

5. Server Locations: Ensure that the VPN provider has servers in locations that align with your needs. This is particularly relevant if you're looking to access content from specific regions or bypass regional restrictions.

6. Reputation and Reviews: Look for credible reviews and customer feedback about the VPN provider you're considering. Check for praise regarding their commitment to user privacy and any issues raised by previous users.

By taking these factors into account, you can make a more informed decision when selecting a VPN service that aligns with your privacy and security requirements.
  •  

Vilperd

When participating in the sharing of bittorrent files, all active participants have access to each other's IP addresses. This information is often used by companies hired by copyright holders, who connect to the distribution and collect IP addresses. They may also save part of the network traffic associated with these IP addresses, potentially using it as evidence in court. In certain European countries, receiving complaints from these companies can lead to serious fines.

It's important to note that even if a VPN provider claims to have a strict "no logs" policy, there may still be some form of record keeping. Therefore, it is crucial to carefully review the terms of use and reputation of VPN providers before choosing one. It's also important to determine whether the provider allows the use of bittorrent and how they handle DMCA notices. It's not wise to prioritize cheapness over privacy and security.

Now, let's consider what steps you can take in such a situation. For instance, if you are located in Germany and the copyright holder is not present there, the choice of VPN provider may not be as critical. In this case, you are relatively safe as you are out of their jurisdiction. It would be highly unlikely for them to file a case against you in a local court due to the expenses and low chances of success. Hence, it is advisable to deny any involvement if questioned. Although the provider may cooperate with authorities, they are unlikely to do so without a court decision, as it would violate personal data protection regulations. At most, they may disable your account. Therefore, a strong denial along the lines of "no, I didn't download it, I don't know, I haven't seen it, I don't know what you're talking about at all" would be a reasonable response.
  •  

cbinstrument

The assertion of not retaining logs is merely a tactic for gaining market interest.
There's no real necessity for us to maintain logs pertaining to your resource usage.

In situations like these, the copyright owner has raised an issue - what more do they want?
Indeed, the distinctive trafficking pattern of torrents makes it possible to identify them.

Unquestionably, it's within your service provider's ability to monitor your traffic, a fact well-established.
If your transmitted data isn't encrypted or if they possess an encryption key, they indeed can scrutinize your data.
  •  

worldtraveler

The hosting provider's response raises some red flags. Their claim of not keeping logs is likely a half-truth. They might not store logs in the classical sense, but they're probably using some form of traffic analysis or network monitoring to detect torrent usage.

This could involve techniques like protocol analysis, port blocking, or even machine learning-based traffic classification. While they might not have direct access to your personal information, they can still infer a lot about your online activities. To protect yourself, consider using a VPN within a VPN (a technique known as "VPN nesting") or exploring alternative, more privacy-focused VPN providers.
  •  


If you like DNray forum, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...