Remix.run Logo
adgjlsfhk1 4 hours ago

the counterpoint is that making your traffic cross out of the US gives the NSA (by their ass backwards reading) permission to spy on you

BLKNSLVR 3 hours ago | parent | next [-]

Fair point, but I'm not sure if that was ever a boundary they wouldn't cross, but for 'a little while now' I'd say it doesn't matter.

From outside the US I should be using a VPN end-point within the US, so that my browsing traffic doesn't hit the NSA - only my encrypted VPN traffic does.

kyboren 2 hours ago | parent [-]

> my browsing traffic doesn't hit the NSA - only my encrypted VPN traffic does

I mean, let's be real.

All known US VPN servers and Tor exit nodes--and probably all US Tor relays regardless of exit policy--are going to be considered a totally legitimate "communications facility" target for the warrantless wiretapping system due to exactly the scenario you just posited.

From that perspective you'd be better off using US residential proxies. Of course, while they'll never admit it in court, NSA just does whatever they want, laws be damned, and are almost certainly logging everything. So while such a scheme might theoretically hinder the introduction of evidence in a court case, it doesn't really matter; NSA is still gonna see your traffic and they're still gonna either drone strike you or "parallel construction" your ass, anyway.

linkregister an hour ago | parent [-]

> NSA just does whatever they want, laws be damned, and are almost certainly logging everything

When you share the evidence for this, it will be international news.

vintermann 3 hours ago | parent | prev [-]

Seems a bit optimistic to think they actually care whether they have that permission or not.