Voyager@psychedelia.ink to Technology@lemmy.worldEnglish · 1 year agoWe have successfully completed our migration to RAM-only VPN infrastructure - Mullvad VPNmullvad.netexternal-linkmessage-square93fedilinkarrow-up1795arrow-down18cross-posted to: technology@lemmy.mlhackernews@derp.fooprivacy@lemmy.ml
arrow-up1787arrow-down1external-linkWe have successfully completed our migration to RAM-only VPN infrastructure - Mullvad VPNmullvad.netVoyager@psychedelia.ink to Technology@lemmy.worldEnglish · 1 year agomessage-square93fedilinkcross-posted to: technology@lemmy.mlhackernews@derp.fooprivacy@lemmy.ml
minus-squareSpaceNoodle@lemmy.worldlinkfedilinkEnglisharrow-up43arrow-down3·1 year agoWouldn’t that defeat the purpose of a VPN?
minus-squarekratoz29@lemm.eelinkfedilinkEnglisharrow-up17·edit-21 year agoNot if you want to VPN to your home.
minus-squaresebsch@discuss.tchncs.delinkfedilinkEnglisharrow-up3·1 year agoBut why would logs you hurt than? How to debug and how to do forensic if only the supposed persons are connected to your home, if you don’t have any logs?
minus-squarejarfil@lemmy.worldlinkfedilinkEnglisharrow-up2·1 year agoVPNs prevent your origin ISP from keeping logs; you may not want your office, school, coffee shop, city wifi, etc. to know which services you’re accessing. You can (should) still require identification on your home hosted services, you can log that.
Wouldn’t that defeat the purpose of a VPN?
Not if you want to VPN to your home.
But why would logs you hurt than?
How to debug and how to do forensic if only the supposed persons are connected to your home, if you don’t have any logs?
VPNs prevent your origin ISP from keeping logs; you may not want your office, school, coffee shop, city wifi, etc. to know which services you’re accessing.
You can (should) still require identification on your home hosted services, you can log that.