is surfshark’s ‘nexus’ thing any good? do other vpn providers have a similar thing that gives you new ip for every link/webpage you click?

at the end of this video guy talks about it https://www.nsfwyoutube.com/watch?v=uSGVk2KVokQ

  • Fijxu@programming.dev
    link
    fedilink
    arrow-up
    22
    arrow-down
    1
    ·
    1 month ago

    Changing the IP constantly is not going to prevent tracking on modern websites. They all use other methods to identify you like browser fingerprint and other ways to fingerprint you.

    I don’t know why VPN providers promote themselves as like they are going to make your connection more private, everything is already encrypted (except DNS). You are just shifting the trust from your ISP to the people that run the VPN.

    If you are in a country with a high rate of censorship or you just want to circumvent geo blocking, using a VPN is worth, otherwise, a VPN is just a way to change your IP address which, is not going to prevent any tracking.

    • mox@lemmy.sdf.org
      link
      fedilink
      arrow-up
      14
      ·
      edit-2
      1 month ago

      I don’t know why VPN providers promote themselves as like they are going to make your connection more private, everything is already encrypted (except DNS).

      It’s true that most popular web sites have moved to HTTPS, but even if all of them had, not all network traffic is web traffic. Also, even if someone uses the network only for web browsing, DNS is not the only privacy-relevant data that gets exchanged outside the HTTPS connection.

      You are just shifting the trust from your ISP to the people that run the VPN.

      Some people have reason to distrust their ISP more than their VPN provider, so this is a valid use case.

      VPN isn’t really comparable to HTTPS. The former protects all traffic, and with a relatively small attack surface, but only up to the VPN edge. The latter protects all the way to the network peer (the web server), but only web traffic, and with a massive attack surface: scores of certificate authorities in countries all over the world, any of which could be compromised to nullify the protection. They address different problems.

    • linearchaos@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      1 month ago

      That’s not exactly true. It really depends on what you’re trying to protect yourself from.

      If you’re running an ARR stack, The Pirate hunters out there are going to end up empty-handed at a half decent VPN in a foreign country. But if you’re doing something that will draw the ire of the FBI, CIA or secret service, it’s a little more than a speed bump.

      Many local ISPs basically hand the keys directly to law enforcement without so much as a warrant. Most of the VPN providers will at least put up a minor fight to stay in business.

  • Peffse@lemmy.world
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    1 month ago

    I know a few services that would ban a user doing that, thinking that the client is compromised.

  • HappyTimeHarry@lemm.ee
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    1 month ago

    Thats not a useful feature so advertising it is pretty sus, i wouldnt trust vpn ads from youtube

  • GolfNovemberUniform@lemmy.ml
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    1 month ago

    I know it’s a bit offtopic but can someone implement such a feature in custom YouTube clients? The “Sign in to confirm that you’re not a bot.” error is tied to the IP so changing it all the time should make the clents work.

    • IphtashuFitz@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      1 month ago

      I doubt it would help. My employer uses Akamai as a CDN & security provider for our websites. Their bot analysis tools regularly flag distributed bot activity that can come from a handful or a few thousand IPs. They do a range of browser fingerprinting, TLS fingerprinting, etc. to uniquely identify traffic across ranges of IP’s. I’m sure Google/Youtube has the ability to do this as well.

      Any given client would need to regularly randomize the order of headers in requests, randomly include/exclude optional headers, and also randomize TLS negotiation to try to circumvent all the fingerprinting these big corporations perform.

      • GolfNovemberUniform@lemmy.ml
        link
        fedilink
        arrow-up
        0
        arrow-down
        1
        ·
        1 month ago

        The problem with that approach is very high risk of false positives. Google may use it but now they use IP blocks.

  • Pasta Dental@sh.itjust.works
    link
    fedilink
    arrow-up
    2
    ·
    1 month ago

    This could be useful, but the thing is, your IP address is rarely what is used to identify you on the internet, even in private browsing mode. Your particular combination of hardware and your behavior (how you interact with it) speak much more than an IP that can be used by more than 1 person.

    • masterofn001@lemmy.ca
      link
      fedilink
      arrow-up
      5
      ·
      1 month ago

      That’s why I use several different browsers with several profiles with containers and use tor with isolated destinations with a rotating selection of DNS over https and anonymizing dnscrypt on virtual machines.

      It keeps the porn recommendations fresh.

  • Bear VPN@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    1 month ago

    Change your IP make you look suspicious especially for the same platform and different page, making your account restricted! why not try auto routine? And for privacy, you should not only focus on encryption but no log policy