Considering Nord VPN

mikefamig

Senior Member
I just spent a litte time reading and trying to learn about VPN services. Nord is highly recommended and the price is fine with me but I am concerned about the response times on their servers/ Is there a noticeable overhead on your access speed?
 
I'm also considering adding a second router that I can run the VPN software on for the added functionality that I can get over my ISP router.
 
So I'm looking for input from those of you who use an online VPN service. Pros, cons, recommendations etc. Good and bad experiences?
 
Mike.
 
 
 
I use Nord; it seems ok to me.  There is indeed some speed hit (as seen by running speed tests), but nothing really noticeable outside of that.
 
As for non-ISP routers, I use an older ASUS router.  Their firmware is VERY CLOSE to DD-WRT open source firmware...there are lots of nice options.
 
However, with some of the latest firmware updates, ASUS broke the ability to control the router via ssh command line interface.  I used to have a script in Kodi that would tell my HA system to tell my router to turn on the Nord VPN (shields up if you will).  Now I have to do it manually via the router web GUI.
 
I may invest in a new router and just flash it over to the latest DD-WRT to try to get back this command line/scripting ability (rather than to have to use the stock web router GUI).
 
Nord does link to pre-configured routers that you can buy and a couple of them do have dd-wrt firmware but they charge and awful lot for configuring it for you.
 
They do offer 30 day money back so maybe I will trial it.
 
Mike
 
I'm running Nord VPN, got a deal through Android Authority for 2 years, like 75% off or something like that. They run deals every once in a while.
 
I cto a VPN service called "private internet access" for one month to see how it works and so far so good. When I check my own IP online it is never my real gateway address. There is a little lag in loading web pages but not bad.
 
Mike.
 
Just a quickie clip and past post relating to:
 
What's the difference between VPN and TOR?
 
It all comes down to trust really.
 
Often you don't know the guy/company behind the VPN service.

Some of them have different logging policies and, as you can read in the link above, they also would reveal the identity if asked in some cases.

So for political reasons (or otherwize) and normal webbrowsing where you want to be really secure and anonymous, TOR is a much better choice.

If speed of large file downloads or access to streaming (video/audio) with geographic restricted regions in the world is your cup of tea, then VPN is the way to go.
 
If speed of large file downloads or access to streaming (video/audio) with geographic restricted regions in the world is your cup of tea, then VPN is the way to go.

Like when you anonymously want to send large music files (if you are a musician), send videofiles (on film or videoprojects), torrent or watch tv in other countries.

Some large corporations have their own tunneling solutions, like Volvo for instance.
This is probably more secure (but there is always the "insider" risk for leak of information).
 
VPN
vpn.jpg
 
TOR
tor.jpg
 
Can you see the difference?

Basically the main technical difference with TOR vs VPN is that with TOR you have a bunch of TOR users (connected to each others) from the entry point (Which is ALICE in the image above) to the exit point(the one that goes to (and from) BOB).

In VPN It's just into and out of the tunnel that encryption takes place (its secure enough for 99.9% of the time. IF you trust the VPN-provider, that is)

(There are also double vpn tunnels. A tunnel inside another tunnel. Or multiple ones. But that costs. And they are slower.)
 
When the information is sent from one computer to another in TOR it is encrypted every time it passes a computer,

The points where this happens are called "nodes".

The users/computers in the relay can't "see"/know who the others are.

And they also don't know who you(Alice) are.

And, Bob (the website you visit)  doesn't have a clue about who ALICE (and all nodes in between) is .

Trust isn't the problem here, since nothing is logged and no one even knows who the other is!
 
And every time you switch to a new website (from BOB to JANE in the example above) a new relay with a different set of TOR users is choosen(at random).

Since there is a lot of encryption and decryption going on for every computer in The (Onion) Network it makes the process really  slow and more unreliable when it comes to speed (you may get lucky at times, but the speed can vary greatly).

The different bandwidths  for the nodes that takes part of it also adds up to the access times.

Also some ISP;s are blocking some of the TOR nodes.
 
Relating to TOR...
 
Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". The intent for Tor's use is to protect the personal privacy of its users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Tor does not prevent an online service from determining when it is being accessed through Tor. Tor protects a user's privacy, but does not hide the fact that someone is using Tor. Some websites restrict allowances through Tor. For example, the MediaWiki TorBlock extension automatically restricts edits made through Tor, although Wikipedia allows some limited editing in exceptional circumstances.

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the next node destination IP address, multiple times and sends it through a virtual circuit comprising successive, random-selection Tor relays. Each relay decrypts a layer of encryption to reveal the next relay in the circuit to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing or knowing the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.

An adversary may try to de-anonymize the user by some means. One way this may be achieved is by exploiting vulnerable software on the user's computer. The NSA had a technique that targets a vulnerability – which they codenamed "EgotisticalGiraffe" – in an outdated Firefox browser version at one time bundled with the Tor package and, in general, targets Tor users for close monitoring under its XKeyscore program. Attacks against Tor are an active area of academic research which is welcomed by the Tor Project itself. The bulk of the funding for Tor's development has come from the federal government of the United States, initially through the Office of Naval Research and DARPA.
 
Is Tor browser all that you need to be encrypted? I have the Tor browser and it appears to me that it uses my computer as a server of some sort. What is a Tor seed?
 
Mike.
 
When you utilize the bootable USB stick that runs the Tails OS you are running TOR as a node as shown in the pictures above.
 
You are surfing incognito.
 
The recent name of the "Dark Net" is because it is so good that it attracts both good and bad folks because is it so secure.
 
It is better referred to as the anonymity network.
 
You can download the bootable ISO for Tails.
 
Tails is
 
Tails or The Amnesic Incognito Live System is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. All its outgoing connections are forced to go through Tor, and non-anonymous connections are blocked.
 
Tails is a live operating system that you can start on almost any computer from a USB stick or a DVD.
It aims at preserving your privacy and anonymity, and helps you to:
  • use the Internet anonymously and circumvent censorship;
    all connections to the Internet are forced to go through the Tor network;
  • leave no trace on the computer you are using unless you ask it explicitly;
  • use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.
 
Tails - Privacy for anyone anywhere
 
Here have Tails OS installed on a micro travel router that is always on and used on demand when I wirelessly connect to the Micro Travel Router.
 
Give the live USB bootable stick a try.  It is free and safe to use.
 
When you try it do a "what is my IP" and you will see random IP's from all over the world and you will not see your base ISP source IP and it will always be different and never your current ISP IP.
 
The use of VPN is currently mostly utilized by folks all over the world which say stream video trying to get to US web sites that are geo blocked by the countries they live in or here domestically to get to international sites geo blocked over here.
 
Personally here like to watch live news from outside of the US which is typically geoblocked here.  IE: there is an internationally broadcast BBC live TV news that you can watch from anywhere in the world and a UK domestic live BBC from London. They are different for different audiences. 
 
Many many years ago with the BUD (big ugly dish) in the back yard (very low on the WAF even behind the back yard shed) would "surf" different satellites / live feeds that came from anywhere.  Only it took some 3-4 minutes to move the dish to different satellites.  Over the years for a bit of time went to a small dish with multiple LNB's pointed to different satellites.  There were premade LNB holders for these dishes which pointed to many satellites.  Only thing was adjusting the dish to get the right footprint.  I used a Nexus satellite PC card for this and for downloading data and live viewing stuff. 
 
Back
Top