Man
Professional
- Messages
- 3,070
- Reaction score
- 606
- Points
- 113
VPN is an indispensable attribute of our craft. Beginners and not only often have the question "Which VPN service to choose for work and surfing?" - none of the services can be recommended, since each of them can log and transmit data on request. It is impossible to check this for sure, because we do not have access to the server organizing the connection. The most reliable way is to raise personal VPN servers to which we will have access, we will be able to monitor their activity and, most importantly, personally disable logs. However, the reliability of the server itself is also important, in this article I will recommend some providers that, in my opinion, remain reliable at the moment, and they have not been noticed working with services, but this does not mean that it will always be so.
To set up a personal VPN, we will need a remote server. You can take the cheapest one, with kvm or light kvm virtualization, with the latest version of the ubuntu system, without RDP.
*Do not pay for the server with personal details that can make you anonymous. Create a separate wallet for payment, which will contain the crypto after the mixer.
Utilities that will be needed for setup:
After purchasing the server, open Putty. Enter the IP of the purchased server, click "Open".
Login: enter root
Next, enter the password for the server (* the password is not displayed when entered)
Update the system on the server by entering:
We see this table - click OK
Next, we enter reboot to reboot the server
Click OK. The server may hang (turn off) for a few minutes, you need to wait .
Next, download outline manager and client.
Open it, select set up anywhere
Click on Share and copy the key to the client
When installing the client, be sure to install the network adapter (if you do not install it, an error will pop up when trying to connect)
We try to connect to the server, check if the IP has changed. If everything is fine, we proceed to disabling logs.
In my opinion, the most reliable option for surfing is TorBox. We roll a VPN on top of TorBox according to the instructions in this article only if you need to get to resources that are not allowed from TOR traffic. And we get an ideal combination of security and anonymity for surfing the network.
To set up a personal VPN, we will need a remote server. You can take the cheapest one, with kvm or light kvm virtualization, with the latest version of the ubuntu system, without RDP.
- vps.ag - optimal in price and quality .
- yourserver.se - runs from TOR
- itldc.com - launches from TOR
*Do not pay for the server with personal details that can make you anonymous. Create a separate wallet for payment, which will contain the crypto after the mixer.
Utilities that will be needed for setup:
After purchasing the server, open Putty. Enter the IP of the purchased server, click "Open".
Login: enter root
Next, enter the password for the server (* the password is not displayed when entered)
Update the system on the server by entering:
Code:
apt update && apt upgrade -y
We see this table - click OK
Next, we enter reboot to reboot the server
Click OK. The server may hang (turn off) for a few minutes, you need to wait .
Next, download outline manager and client.
Open it, select set up anywhere
Click on Share and copy the key to the client
When installing the client, be sure to install the network adapter (if you do not install it, an error will pop up when trying to connect)
We try to connect to the server, check if the IP has changed. If everything is fine, we proceed to disabling logs.
- We clean and block files not related to vpn, these are files that record the connection to the server via sssh and other protocols.
To do this, go to the /var/log folder on the server, with the command: cd /var/log - After that, we will clean three files - btmp, lastlog, wtmp. To do this, so as not to clean manually, you can write it like this:
Code::>lastlog :>btmp :>wtmp
- Now let's set a ban on recording for them like this:
Code:sudo chattr +i lastlog sudo chattr +i wtmp sudo chattr +i btmp
- After this, we will delete the remaining files (there will be three errors, this is normal):
Code:rm -r /var/log
- And we'll disable system logs like this:
Code:systemctl disable rsyslog systemctl disable syslog.socket
- Next, check the contents of the files.
Enter the command cat lastlog - if nothing is displayed, then everything has been deleted.
In my opinion, the most reliable option for surfing is TorBox. We roll a VPN on top of TorBox according to the instructions in this article only if you need to get to resources that are not allowed from TOR traffic. And we get an ideal combination of security and anonymity for surfing the network.