Do more on the web, with a fast and secure browser!

Download Opera browser with:

  • built-in ad blocker
  • battery saver
  • free VPN
Download Opera

Search tubs

  • Dudes, I can't seem to hop into my Yahoo! mailbox - when I log in, the browser says it can't reach the server.
    Check it out somebody, will you, please?

  • Today it's working.
    Thanks.

  • Today it's working.
    Thanks.

    Nah'uh, same again. Can't reach the box today, nor some other Yahoo! pages.

  • @blackbird71

    Birdy, typo here, third paragraph, last sentence. 🤦
    😉

  • Anybody knows something about this animal?
    There appears to be more info on that page, from which it might seem that this is like a standalone app, not a plug-in. 😕

  • Looks like it may include a browser plugin to transfer videos to the app, but I'm not certain.

  • Right, nice, thanks.

    My consideration still exists that if the THING will behave or not here.
    Nobody heard of the animal? I haven't. I got it downloaded - though I'm unsure if it's safe to install. 😕

  • Bathing in my tub, I stumbled upon an advertisement-slash-announcement-slash-offer,

    Did you know your ISP can see all the websites you visit, including your movie watching activities? Protect Your Privacy with a Free VPN *

    Well, I ended up checking it out, and it had an extension for Firefox and a "Full VPN Client Firewall" for Windows. I installed the plug-in but am cautious if the "Firewall" will behave - Mozilla said the extension had been checked preliminarily (meaning it still can be buggy).
    What do you think? Do you know this WS and if the idea of installing a hardbrick system firewall is o'k if the client might be 'experimental'.
    I'd rather not linger long: the RF's usurthorities might find and try blocking it, it's said to be powerful.

  • I found a favorable online review via Google, with a fair amount of descriptive detail *

    The product is pretty new, so there's not a lot of user feedback reporting out there. At this stage, it's hard to say whether the few online reviews are legitimate or not, since some software companies (especially startups) have been known to 'stuff the ballotbox' with their own reviews, and only time will tell until other reviews roll in. Be sure to read the Chrome-version reviews at the Chrome store (they seem to have more data than the Mozilla extension store), especially the negative ones and the VPN maker's responses, to get a sense of various 'issues' that might or might not affect you. As with any VPN, always keep in mind that your ultimate security is in the hands of the service operator and his server integrity. Likewise, a user's ability to access a particular VPN is dependent on the server portals continuing to not be blocked by 3rd parties.

  • Among other things are you saying there might not be too much of a point?

  • I found a favorable online review via Google, with a fair amount of descriptive detail *

    Some the of the services Windscribe offers are free, starting with the browser extension and secure link generator. They also have a free VPN plan that normally caps at 2 GB of usage a month. During their launch period they are offering new users 10 GB of monthly VPN access free of charge. Free users are limited to certain server locations and can only connect with a single device.

    1. "Caps at.."? What does it mean?
    2. How do VPNs work at all? Having read that, I doubt I had an idea: I mean technically - for the user.
    3. Do I need to sign in to have it to work?
  • 1 Maximum usage. If you want more capacity, you have to pay for it.

    2 VPNs encrypt traffic to the server, and between their proxies. Just a basic proxy service, but encrypted until it leaves the proxy for the final connection. Whatever site you are connecting to sees only the proxy's address and not who it is handling the request for.

    1. I mean how does it work? WHAT IS that capacity? The capacity means what? Some traffic?
    2. I mean how does it work/look from the user's side? (It might be different for a browser plug-in (extension) and for a system client, will it?) Does it require the user to handle something special? Does it block something which usually isn't?
  • A usage cap (capacity limit) sets the maximum cumulative amount of data that can flow over the connection in a stated timeframe. Going beyond that either breaks the connection or sets a very low data transfer speed thereafter, depending on the arrangement with the provider. A 2GB/month connection means that's the max data you can route over it in one month. Normally, if all you're doing is browsing and a bit of posting, most of your data flow will be consumed in the download phase, with uploading consuming much less data flow (unless you're pushing pictures or video somewhere).

    A normal unsecured internet connection routes its data packets in-the-clear directly to/from a target IP address, via your ISP, the Internet backbone, and the target's ISP or domain server. This makes it fairly easy for the powers-that-be to block/censor/monitor your traffic flowing to various IP addresses. Using https encrypts the data that moves between you and the target site, but does nothing to hide who you are communicating with. In the case of a VPN, it creates a 'virtual private network' that tunnels data over the Internet by using a module on your system (in WS's case, a browser plug-in) to encrypt your traffic and route it to a WS server's IP whereupon it's typically relayed while still encrypted to yet another WS server in another region where it's decrypted and delivered directly to the target IP address. Return traffic from the target site is sent back to that regional WS server, encrypted, relayed to another WS server, and finally sent to you encrypted from the WS server to which you're connected, whereupon it's decrypted in your plug-in and displayed in your browser.

    Assuming the encryption is good quality, no outside 3rd party can tell what data you're sending/receiving or to/from what end-target site over a VPN, and the only connection they can see for you is the one to the WS server carrying encrypted data. For this to work securely, the encryption must be good, the server operator (in this case, WS) must be trustworthy, and your system must be clean (free of planted keyloggers, etc). In that case, if someone is snooping your connection, about all they can tell is that you're sending/receiving encrypted traffic via at least one of several WS VPN servers. However, where Internet traffic censorship is strong and sophisticated, the authorities will often attempt to block user access to known VPN server IPs (as well as other kinds of proxies) to prevent users end-running their censorship or IP prohibitions. More importantly, in certain repressive locales, use of any kind of proxy may be prohibited without special state license or permission, so that personal use of a VPN can lead directly and quickly to unpleasant 'legal entanglements' - often in the middle of the night. The wise user in such places will always carefully check out what he's up against before committing to using a VPN. Just sayin'

  • Not that I've heard of Russia being quite that bad ...

  • Steve, you're right.

    Black, I get VPNing slows things a bit, right?

  • Steve, you're right.
    Black, I get VPNing slows things a bit, right?

    Well, a VPN adds a couple of servers in the path to/from the destination, and it adds both encrypt and decrypt processing to the data flow, so there's bound to be an increase in latency. How much depends on the VPN service itself and the coding efficiency of the local encrypt/decrypt module.

    Indeed, at this point, Russia isn't a major problem. However, over the years, I've learned that other eyes may read threads like this at some moment of time. Particularly for users in certain locales of the Middle East and Asia, cautionary VPN/proxy notes are always prudent, just in case. I know personally of doors kicked in and people dragged away in such places, so it's a most serious issue for folks in those locales to fully understand the ocean in which they're swimming before they simply blunder into truly dangerous waters.

    1. Does it add to the CPU?
    2. Can they always know someone is using a VPN?
    1. I don't know, but I'd suspect it adds at least some loading, if only for the encryption/decryption activity.
    2. Your up-bound IP connection data has to be routed to the VPN proxy server, so if the snooper has up-to-date records of which IP's are associated with various VPNs, he would know a VPN was in use and which brand. The key questions really involve the quality of his snooping mechanisms, whether he tracks all the new VPN IPs out there, and whether he has incentive or interest in immediately blocking them all. In repressive locales where snooping is very extensive, two things can set off a snooping system's alarm bells: use of encrypted connections and accessing a known VPN or proxy IP. The two occurring together usually implies a user is probably trying to end-run the snooping system, so it becomes a matter of the authorities' policy in such cases as to what would happen next: block, simply ignore and allow, wait-and-watch, begin compiling a dossier, or kick down the user's door. Depending on locale and the current political atmosphere, YMMV.
  • So what should it look like really to use this VPN?
    I mean 1) should I "Sign up to Windscribe" as its icon wants me to?
    2) If there's 2GB or 10GB "cap", what exactly does it mean in terms of usage? Does it mean I can switch it on and off to save those 2 or 10? Or does it mean that I use it switched on default/automatic for a couple of hours/couple of days --- then what???
    😕

Log in to reply