Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)PO
Posts
18
Comments
981
Joined
2 yr. ago

  • I work for a VPN company. There may be many shitty VPN companies that do keep logs, but not all of them.

    You just need to pick the right ones, ideally audited ones.

    Also, VPNs are absolutely required in some countries if you're using public torrents. Even if they're not required in your country right now, you're still advertising that you're doing illegal stuff if you don't use one.

  • You're totally right, I just think you underestimate how long it takes to rigorously audit a whole codebase. Let's say you look for outvound network calls. Now you need to figure out for all of them whether they are malicious, which will require specific domain knowledge. And that's assuming you find them all, the network call could be hidden away in a dependency. None of this is impossible but it requires a serious effort.

  • Dodged a bullet

    Jump
  • The types of companies that are allowed to operate and the bounds in which they are allowed to operate absolutely define countries. Norway has a capitalist economy, which allows this kind of company to thrive.