You sure you trust VPN providers? Would it not be better to make your own VPN?

Chapters
  • 0:00- Quick overview of WireGuard
  • 01:41- WireGuard VPN setup // Choosing a Linode Plan
  • 02:49- SSH to the Linode server
  • 03:46- Updating and upgrading server
  • 04:25- Installing WireGuard
  • 05:05- Hiding your WireGuard private key
  • 07:03- Adding a new WireGuard interface
  • 10:14- Setting up WireGuard on a Client computer
  • 15:08- Disabling IPv6
  • 18:35- Setting up NAT
  • 21:28- WireGuard installation summary
  • 22:24- Setting up persistence for WireGuard
  • 26:33- Create another SSH user
  • 30:11- Remove root SSH access
  • 34:00- Reasons to use WireGuard
  • 36:30- Conclusion
  • towerful@programming.dev
    link
    fedilink
    arrow-up
    8
    ·
    1 day ago

    Stop trusting VPS providers! Run your own servers at home!

    Unless you infiltrate someone else’s network, the endpoint your basic VPN connects to can always be traced back to you.
    So, either you trust a VPN company doesn’t hold logs and try to hide within all the other traffic.
    Or you host your own VPN on a VPS knowing you haven’t set up any logging (and hope that your VPS hasn’t been tampered with), but then have a static IP that comes back to your identity.