Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ
Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit here or GitHub Ξ
Ξ If you're looking for tutorials/guides, check out the new https://cryptostorm.is/#section6 Ξ

How to Achieve complete privacy and security?

Looking for assistance with a cryptostorm connection issue? Post here & we'll help out. Also: if you're not sure where to post, do so here & we'll move things around as needed. Also: for quickest support, email our oddly calm & easygoing support reps at support@cryptostorm.is :)

Topic Author
kingping1
Posts: 8
Joined: Wed Apr 11, 2018 7:27 am

How to Achieve complete privacy and security?

Postby kingping1 » Mon Apr 30, 2018 8:46 pm

I'm a intermediate person in terms of knowledge of securing internet privacy and encryption, so I just had a few questions, for those of you who know what is best.

1. Is Cryptostorm VPN with dnscrypt as good as just using TOR, in terms of privacy and encryption/security, OR do I still need to use TOR and connect to it. (btw I use Firefox and do the about:config, with ublock, ghostery and all that)

2. If I wanted as much total privacy AND Security/encryption that is reasonably easy to use, What services or applications would I use for that?

Ex. for various services

Browser - ? Firefox(about:config) or TOR?
VPN - Cryptostorm
Email - Tutanota/Protonmail?
Text/SMS - Signal?
Operating system - Live Tail OS?
For overall security/encryption - ? (i'm using Windows 10)

Am I missing something, or do you guys have any other tips/recommendations to offer?

Thanks.

User avatar

parityboy
Site Admin
Posts: 1234
Joined: Wed Feb 05, 2014 3:47 am

Re: How to Achieve complete privacy and security?

Postby parityboy » Wed May 02, 2018 1:39 am

@OP

1. Cryptostorm do not keep connection or traffic logs, so the level of anonymity compared to Tor - at least in terms of tracing - is basically the same.

Additionally, Cryptostorm - via DeepDNS - offers transparent access to .onion and .i2p hosts without the need to install additional software. Having said that, there is nothing stopping you from using Tor Browser or a client Tor instance in addition to the VPN connection.

2. Here's what I use.

VPN
Cryptostorm

Browser
Firefox (with modifications to about:config)

Email
yopmail or throwaway G-Mail accounts

OS
Virtualbox VMs running Linux instances for specific purposes, encrypted using LUKS/dm-crypt.

General
My network (including the VMs) is protected using an instance of pfSense which is configured to maintain two connections to Cryptostorm and direct all traffic along those VPN connections. Additionally, all of my external drives are encrypted with LUKS/dm-crypt.


Guest

Re: How to Achieve complete privacy and security?

Postby Guest » Sun Jun 24, 2018 8:58 am

parityboy wrote:@OP

1. Cryptostorm do not keep connection or traffic logs


HAHAHAHA LOL GOOD ONE MAN, GOOD ONE! :D :D :D :lol: :lol: :lol: :crazy: :crazy: :crazy:

User avatar

df
Site Admin
Posts: 370
Joined: Thu Jan 01, 1970 5:00 am

Re: How to Achieve complete privacy and security?

Postby df » Wed Jul 04, 2018 1:45 pm

@Guest
We don't keep connection/traffic logs, see https://cryptostorm.is/privacy


Return to “member support & tech assistance”

Who is online

Users browsing this forum: No registered users and 41 guests

Login