Original page on the clearweb: http://vpnscam.com/tesonet-data-mining-company-owns-nordvpn-protonmail-protonvpn/
Offline archive (READ NOTES BELOW ON HOW TO OPEN): https://i.imgtc.com/FSzFXt6.png
TL;DR for those of you who won't bother reading:
NordVPN and Protonmail share a CEO. They claim to operate in Panama/Switzerland, but both companies are shell companies, owned fully by PROTONVPN LT, UAB, which is located in Lithuania, which has a law requiring 6 months of data retention (this matters, because, even though they tell you they keep no logs, they are legally required to maintain them). Finally, the headquarters of PROTONVPN LT, UAB, is in the very same building as TesoNet, a Lithuanian data mining service. ProtonVPN claims that the colocation is just happenstance, and they don't actually work with TesoNet, but researchers found NordVPN using privacy certificates signed by TesoNet in their official app binaries.
This also applies to DuckDuckGo as well, who was started by (((Gabriel Weinberg))) to capitalize on all of those wanting to jump ship from google, and does track clicks and links (though it claims not to). An article by the timesOfIsreal on Weinberg's site, which didn't have any traffic worth speaking of until the Snowden limited hangout, which pushed everyone even mildy privacy-aware straight into the dragnet.
Notes on "stealth archives": The archive is a zip file of the page as retrieved a few days ago by me via wget, renamed as a png so the imagehost would accept it. Rename to a zip file to view, or, if on linux, 7z can open it as is.
I call them "stealth archives" because the image host can't tell a download to view the content apart from a download by a browser to display the page, the ISP can only see the DNS resolves to an image host (which gives no hints), and it bypasses the (((internet Wayback Machine))), which watches who is interested in what sites and when, and will memoryhole 'dangerous' sites.
BTW, if the owner of imggoat sees this, your site crashes, showing a traceback, when uploading a not-png named as a png. Could be a security vulnerability, just throwing that out there.
Shoutout to @BloodAndHonour, whose recent recommendation of NordVPN prompted this post.
view the rest of the comments →
Flour ago
Conspiracy hat: this is an astroturfing post used to discredit secure services
Conspiracy aside, looks pretty legit that they are both compromised. Also, always wondered whether or not it’d be better to just use the big tech services and attempt to be lost in the web of traffic using coded language and such.
alele-opathic ago
Well, this is why I advocate you do your research. Astroturfing only works if your recipients only plan to skim the surface.
IMO, blending in assumes that they expend equal resources monitoring each person, which can only be true if you can enforce anonymity. If you can, as Google/Facebook has, make everyone use their 'Real Name' online, then you can profile-build and triage them, and watch only the 'maybes' intensely for key words or key phrases. Look into an AI natural language concept called 'Sentiment Analysis', it is this triage I speak of, by a different name.
There isn't any way out except widespread forced anonymity.
Turn_Coat ago
That'd mean war...