You are not logged in.
Pages: 1
I notice they go through phases of hardcore blocking VPN and uBlock users. For instance using a UK VPN or some European VPN gets you a captcha, but swapping to more obscure VPN's can bypass it. Also trying to watch certain videos gives you a demand to log in (CIA video from (possibly) VICE a few weeks back is one I've noticed a late).
My suggestion is VPN and use uBlock with all of the blocklists enabled, CanvasBlocker enabled and self destructing cookies. For me it works maybe 99% of the time, but some videos you can forget about it.
May I ask why you bother with OpenVPN when we have WireGuard?
My ISP completely blocks Wireguard. No dns resolution when using it, can't ping anything and when I asked one of their tech support (a friend from Uni), was told the unofficial policy was to block all wireguard connections via some adaptive AI traffic analysis box, but they won't publicly admit to doing so. He said use OpenVPN on the https port because they don't block OpenVPN since it runs on ports that are used by legitimate services and a lot of businesses use it.
----------------------------------
As to using latest versions, this is one of a handful of programs that I actually compile from source. I'm running 2.7.3 which is the latest. 2.7.1 is old now and 2.7.2 introduced two bug fixes, one that can potentially leak packets on handshake and one that affects servers. Debian packages are rarely fully up to date with the latest releases and definitely not on the day of the new release dropping.
I have two machines that run Devuan. One runs stable, the other oldstable.
The oldstable machine was running the current openvpn for oldstable 2.4.7 (off the top of my head). So the VPN company I use decided to do a security overhaul and presumably upgraded all there infrastructure to a newer version. So at some point, that machine stopped connecting because the version was too old. I tried exploring backports, and also explored pulling in OpenVPN from stable, to no avail. I found I could get it to connect by commenting out data-ciphers in the ovpn file, but that's not an ideal solution.
My solution was to build the newest from source. I grabbed all the dependencies from the Devuan repos. I will take over maintaining OpenVPN myself as I would prefer it was up to date (latest version of OpenVPN, ie, 2.6.4 currently).
So my question.
Are there any security implications, besides the obvious need to rebuild when the dependencies get updated?
I do come from a Slackware background and the need to monitor lists and manually upgrade things is not a big problem for me. I did it for years when i ran Slackware.
Used to use it years back, but a lot of it's ad blocking features are better achieved at the browser level, via say ublock origin. You can also do a system wide adblock using the hosts files found at https://winhelp2002.mvps.org/hosts.htm which I also tend to deploy as a more blanket effort against the ad companies.
Nowadays I find Ublock with all blocklists enabled gets rid of 95% of all ads, but some keep sneaking through (duckduckgo, facebook). In the grand scheme of things i don't use the products from FB much so it doesn't bother me.
When i did use Privoxy, I only used defaults. I think that was probably about 15-20 years back.
Pages: 1