Originally Posted by
HDQDD
My primary use of VPNs is to securely access my home or clients’ private network(s). Although, I do use them for the above reasons too. You shouldn’t be leaking identity info if you have your tunnel configured properly. I don’t use public wifi without tunneling my data. If you tunnel through s known ASN, you’ll likely find it blocked by most major location dependent or governed services. Even with major VPN providers, I find I can often disconnect/reconnect and get routes out through a non blacklisted ASN
Oh, it's not usually the VPN that is at fault about leaking information. But the problem is still between the chair and the keyboard. You connect to a VPN, but then sign into your gmail account as well as FT and FB and use Google.ca instead of .com or DDG or whatever else. Then you go to BoardingArea to read a few articles and whatever other travel forums you may frenquent. By that point, your profile should have been updated with at least some information including that you may be using a VPN.
Used properly, great. But again, so many people leak out information without knowing it. I've been known to use a commercial VPN or two while out and about. Mostly to ensure the MITM doesn't know what I'm reading (don't really care if they know where I was visiting the last few times but the VPN blocks that bit of info). Messed with the analytics a bit (queue up 100+ random videos on Youtube and let them play while you sleep and watch the suggestions they make for you when you wake up).
As for blacklisting ASNs, often the ASNs aren't listing the actual VPN provider, just the provider of the exit point. M247 is a very common one. While they host VPN providers, they also host for others (and that's the part that's annoying sometimes)