US Gov says 'Don't use a VPN'. Should you trust it?
The Hated One
@thehatedoneAbout
Because nothing good exists without condition. DISCLAIMER! This channel doesn't use generative AI for anything. All of my voiceovers are my real voice with no AI. All research, writing, recording and editing work is my human labor. The software I use for my work is Libre Office, Audacity and Davinci Resolve. https://www.patreon.com/thehatedone https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone
Latest Posts
Video Description
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone When the US intelligence tells you anything, there's a 50-50 chance the opposite might be correct. The US government is seeking moral redemption. After decades of telling us that we should trust it with backdoors into our communications, it finally backfired spectacularly. Just as the privacy advocates have always been saying – that you can't have encryption badckoor just for the good guys. "For months or longer", Chinese government hackers held access inside US internet service and telecommunication providers collecting all of our browser histories, phone data and much more. This of course is a major national security risk. As any high-ranking politician, journalist or a random citizen, could be held at ransom for all the dirt the Chinese government now holds on each AT&T and Verizon customer. We'll probably see a major spike in support for Chinese policies as all the naughty secrets of key elites and individuals will be held for blackmail or it might "accidentally" leak to the press. That's how serious this is. So now the US government is officially endorsing end-to-end encryption and private communication. But... that's a bit hyperbolic. Only one agency – the Cybersecurity and Infrastructure Security Agency, endorses it. Encryption backdoor that only the "good" guys can access, does not exist. One man's backdoor is another man's vulnerability. That came out wrong. Or did it? So CISA has issued a privacy and security tutorial for all Americans to adopt. And it contains a lot of points about which I have lots to say. I already talked about the Signal recommendation. I can talk about more if you are interested, so let me know in the comments. But there was one recommendation that I did not expect to see. It goes against something that I've been recommending on my channel for a long time. It's about using a personal VPN, or Virtual Private Network. SOURCES [references available in the transcript] [0] https://www.eff.org/deeplinks/2024/10/salt-typhoon-hack-shows-theres-no-security-backdoor-thats-only-good-guys [1] https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b [2] https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf [3] https://www.fbi.gov/about/mission/lawful-access [4] https://www.foxnews.com/tech/massive-free-vpn-data-breach-exposes-360-million-records [5] https://www.techradar.com/pro/vpn/over-25-billion-free-android-vpn-users-at-risk-of-data-leaks [6] https://www.cnet.com/tech/services-and-software/3-companies-control-many-big-name-vpns-what-you-need-to-know/ [7] https://www.zdnet.com/article/trust-but-verify-an-in-depth-analysis-of-expressvpns-terrible-horrible-no-good-very-bad-week/ [8] https://www.cnet.com/tech/services-and-software/what-is-kape-technologies-what-you-need-to-know-about-the-parent-company-of-cyberghost-vpn/ [9] https://www.usatoday.com/story/tech/news/2017/04/04/isps-can-now-collect-and-sell-your-data-what-know-internet-privacy/100015356/ [10] https://arstechnica.com/information-technology/2017/03/how-isps-can-sell-your-web-history-and-how-to-stop-them/ [11] https://harvardlawreview.org/blog/2018/06/future-proofing-the-fourth-amendment/ [12] https://www.cloudflare.com/learning/ssl/what-is-https/ [13] https://www.cisco.com/c/en/us/products/security/vpn-endpoint-security-clients/what-is-vpn.html [14] https://mullvad.net/en/blog/we-have-successfully-completed-our-migration-to-ram-only-vpn-infrastructure [15] https://gizmodo.com/vpn-mullvad-search-warrant-data-it-doesnt-collect-1850358717 [16] https://www.wired.com/story/the-grand-tor/ [17] https://orbot.app/en/about/ Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
You May Also Like
Secure Your Browsing Now
AI-recommended products based on this video

Micro Firewall Appliance/Mini PC, OPNsense, VPN, Router PC, Celeron N5105, 4x2.5GbE I226-V Fanless Computer, AES-NI, HDMI, DP, 32G RAM 1TB SSD

Mini PC, Celeron J6412 Fanless Firewall Appliance, 6 x 2.5GbE i226-V LAN Micro Router Computer, AES-NI, OPNsense, VPN, Router PC, 32GB RAM, 1TB SSD

Micro Firewall Appliance/Mini PC - 𝐢𝐧𝐭𝐞𝐥 N150 (Upgraded N100, 4C/4T), 4X 2.5GbE i226-V, AES-NI, 8 USB, HDMI2.1, DP1.4, Dual Display, VPN Router, 32GB RAM 512GB SSD













