Oddbean new post about | logout
 > Also wireguard isn't going to protect anybody's IP address. VPNs work only by virtue of mixing a bunch of people into the same IP address and adding an extra hop.
And trusting a "public" provider. Assuming you are using a shared VPN of course. Otherwise you are just moving your physical location.  
 You could specify a nested wireguard protocol to allow connections through existing wireguard tunnels. Then you can do something like TOR eventually. I wouldn't do it straight away, I'd just limited the packet size to allow for encapsulation without fragmentation. 
 my VPS only knows my IP address, they don't KYC me, and they are in a foreign jurisdiction

it's still identifiable but not physical location identifiable

also there is no tooling to change them periodically, if me and 100 other people all ran one each and we changed our endpoint every half hour or so it would be pretty good i think

the thing is the anti-VPN defenses out there are so full on, even though my VPS is just a known VPS address they treat it like a VPN very often, even though the address is stable and all

internet security is broken af 
 Yes, you made my point exactly :) 
 this is my biggest bitch/internet security/IP/ can't go back to couch serfing:) 
 surfing