Just look for any VPNs that are advertised specifically for China, Russia, or Iran. These are the cutting edge tech, they may not be so privacy-friendly as Mullvad, but they will certainly work.
Just look for any VPNs that are advertised specifically for China, Russia, or Iran. These are the cutting edge tech, they may not be so privacy-friendly as Mullvad, but they will certainly work.
If I was working for a secret service for these countries, I would set up many "VPNs that are advertised specifically for x" as honeypots to gather data about any dissidents.
[0]: https://www.inc.com/jennifer-conrad/the-fbi-created-its-own-...
I hope I do not present the presence of a dullard unfamiliar with this.
To give an analogy, this is similar to why "security by obscurity" isn't a valid option if you're serious about security.
Let's say that admin access is open on my server on a certain port and: 1. I have done nothing specific to secure it, and 2. it has been shown that there are adversary actors scanning for vulnerable ports on the network.
I can either take your apparent stance that "this means nothing to me", or I can consider the situation equivalent to "this server is already compromised, I just don't know it yet".
In the current conversation, the combination of: 1. no reasonable reason to believe ExampleVPN keeps your data private and 2. high incentives for adversaries to create fronts plus proof they've done so in the past, means that for people such as myself and GP, the situation is equivalent to "ExampleVPN is a front" until we have a reason to believe otherwise.
Edit: Telegram's not-really-end-to-end-E2EE would be another such example.