• p1mrx@sh.itjust.works
      link
      fedilink
      arrow-up
      4
      ·
      8 months ago

      So your threat model assumes an actor with a quantum computer capable of breaking RSA, but not a regular computer capable of filtering by IP address?

        • p1mrx@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          ·
          8 months ago

          A VPN encrypts traffic between your device and the VPN server, and any packet on that path includes your IP address. So anyone attempting to decrypt your VPN traffic can trivially distinguish your packets from other users of the VPN server.

    • You999@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      8 months ago

      A VPN is only a single end point just like your ISP meaning you are only shifting the problem to your VPN provider who admittedly is more trustworthy than your ISP but you are still putting an immense amount of trust into a single point of failure.

      If you truly want to hide from your ISP or really anyone, your only options are to use TOR or I2P where your traffic is encrypted and tumbled through multiple servers.

    • neutronst4r@beehaw.org
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      8 months ago

      Absolutely no one is using quantum computers to brute force encryption, stop the fear mongering.