Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://tiggi.es/@thygrrr" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>thygrrr</span></a></span> <span class="h-card" translate="no"><a href="https://social.treehouse.systems/@PallasRiot" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>PallasRiot</span></a></span> Personally, I'd not count on <span class="h-card" translate="no"><a href="https://mastodon.online/@mullvadnet" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mullvadnet</span></a></span> being a <em>"<a href="https://infosec.space/tags/LoglessVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LoglessVPN</span></a>"</em> because if they were unable and/or unwilling to comply they would've been shut down due to the statistical inevitability of being swarmed by bad actors!</p><ul><li><a href="https://infosec.space/tags/TLDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TLDR</span></a>: <a href="https://infosec.space/@kkarhan/114953865903981711" rel="nofollow noopener" target="_blank">Don't rely on anyone to cover your ass!</a> and exercise proper security <a href="https://infosec.space/tags/Nachash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nachash</span></a> <a href="https://pastebin.com/GrV3uYh5" rel="nofollow noopener" target="_blank">did</a>.</li></ul><p>This is far more complex than just <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a>, but <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a>, <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpSec</span></a> & <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a> come together and need to be weaved into a continuous, multi-layered pattern...</p><ul><li>Your mileage may vary depending on your needs, demands, threats, budget, capabilities and options.</li></ul><p><em>"JuSt UsE a VpN!"</em> is dangerous <a href="https://infosec.space/tags/disinfo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>disinfo</span></a> towards <a href="https://infosec.space/tags/TechIlliterates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechIlliterates</span></a>!</p>