Sponsored by Linode! Get $20 credit for your first cloud server or VPS here: https://linode.com/wolfgang Text version: https://notthebe.ee/Creating-your-own… OpenVPN road warrior installer by Nyr: https://github.com/Nyr/openvpn-install Support the channel: Patreon http://patreon.com/WolfgangsChannel Follow me: Twitter https://twitter.com/notthebeeee GitHub https://github.com/notthebee Music: Falls – Triboro Memory Theory – Polymath Falls – Magenta Timestamps: 00:00 Introduction 00:33 “But I only use VPN for Netflix…” 01:28 Everything wrong with the VPN services 01:49 “Your ISP is spying on you!” 02:27 “Open Wi-Fi networks are dangerous!” 02:39 Military Encryption ™ 03:28 “We will never keep logs or sell your data!” 04:03 PureVPN and Schroedinger’s logs 05:09 PrivateInternetAccess acquisition 05:23 NordVPN 2018 breach 05:50 What are the alternatives? 06:00 Tor 07:25 Self-hosted VPN 07:39 VPN services vs. Self-hosted VPNs 08:58 Choosing a VPS provider 09:18 Virtualisation technology 09:49 Dedicated IPv4 address 10:11 Location 10:43 My choice of the VPS provider 11:25 Creating an account (The tutorial starts here) 11:45 Creating a VPS 12:37 Generating SSH keys 13:46 Updating the packages 14:07 Creating a non-root user 15:04 Configuring SSH 17:14 Installing and configuring OpenVPN 20:50 Installing mosh 21:14 Two-factor authentication 23:53 Automatic updates 25:11 Conclusion
Welcome to the comment section! Please read the FAQ before leaving a comment:Q: How do you know that the VPS doesn’t keep the logs? Isn’t that the same as trusting a VPN service?A: Every Internet gateway can potentially log and monitor your traffic. A VPN (be that a VPN service or a self-hosted VPN) doesn’t give you extra privacy or anonymity and can potentially monitor your activity. Instead, if you need some extra privacy while browsing the Internet, you should use Tor 06:00 As I mentioned in my last video, VPNs should be used to avoid censorship, geoblocks and DMCA letters, but they won’t magically make you more secure and anonymous. Q: Are you only recommending a VPS as a solution because you were sponsored by Linode?A: No. I’ve been using a self-hosted VPN since 2017 and am currently using a VPS from another company. I’ve also been approached by a several VPN companies that offered to sponsor my videos; I politely refused their offers because such sponsorship will go against my point of view on VPN services. Linode is one of the biggest VPS providers on the market and I’m glad they sponsored this video, however you can always choose another VPS to host your VPN: DigitalOcean, Vultr, Hetzner, etc.Q: But doesn’t a self-hosted VPN make you more identifiable since you’re the only user?A: Unlike a VPN service, on a self-hsoted VPN you get a dedicated IP that isn’t shared with any other users. However, a shared IP on a VPN service doesn’t give you more privacy: you still use your real IP to connect to it, and your account has a unique identifiable set of keys.In both cases if a certain government agency were interested in your online activities, it would require requesting logs from the provider, and in case of Linode (or any VPS provider) the authorities would only retrieve connection logs (e.g. when you connected to the VPS from your IP address) – so pretty much the same as with a VPN service. In both cases the authorities can also request logs from the data center providers or hit the service with a FISA warrant if they reside in the US.Q: Is this tutorial only going to work for Linode?A: No, this tutorial applies to any KVM- (and possibly Xen-) based VPS. The only part that’s going to be different is the process of creating an account, which is pretty easy.
Hey, thank you for this. I saw this on google but no one makes a tutorial. Glad I saw this today on my recommendation. Gonna finish this tutorial and will sign up with your link. Thanks again
At age 80 , I listen to you and marvel. As an old Ham operator, that had to buy Tandy, and then type in code we copied out of a monthly fan magazine, then have to spend a few months of searching for mistakes to get the programs to run…it was an adventure alone, to create on our own , the first TTY just for Morse code. No way today, can I learn to code like all you pros do today. So, I guess that I will have to scrimp on some things and afford a good recommended VPN to pay by the month. I treasure my entertainment on video boxes to watch anime and movies, and right now, so many are blocked..as well as there are constant threats that severe prosecution terms are warned just for watching certain sites. So, thanks for providing the info here…but wow…. I am so glad that there are actually youth out there that have learned higher skills than sending emoji on their cell phones and think that is actual communication. All the BEST Tejasmed TX USA
I’m a newbie to all things related to coding.I’m learning SQL and Python and how API’s work. But how did you learn about this?Can you give me some pointers on how you learned all this? What books have you read? Do you have any recommendations on where I should start?Warmest regardsM
I’m a cybersecurity expert with over 1337666 years of experience in the field.HTTPS doesn’t encrypt any data, is just runs it through some math that makes is very difficult for people to sniff out the data going over the connection.It’s not encryption though!(disclaimer: this comment is purely satirical…)
Using password authentication on SSH is encrypted, it’s send over the encrypted SSH tunnel just like any other data to the SSH server.SSH Key authentication is preferred option and provides much better security, against people setting silly easy to crack passwords.
Personally I love the movement for personally owned data like your privacy and files. As an enthusiast with multiple industry grade certifications behind me ranging from general certifications in cyber-security & general networking to Cisco university grade diplomas. I don’t care about my own privacy (I know controversial opinion for my field..) however I stand behind this video in more ways then one, he outlines the benefits to self-hosting your own VPN perfectly.The reason I use VPN’s is to allow much better security within my networks for the company I run. By only allowing OpenVPN’s port past our network firewalls and then encrypting all user profiles substantially it allows me and our employees to access and be on these networks remotely without fear of multiple ports/applications vulnerabilities.Awesome video, love your other content too!
For Mobile UsersTimestamps: 00:00 Introduction 00:33 “But I only use VPN for Netflix…” 01:28 Everything wrong with the VPN services 01:49 “Your ISP is spying on you!” 02:27 “Open Wi-Fi networks are dangerous!” 02:39 Military Encryption ™ 03:28 “We will never keep logs or sell your data!” 04:03 PureVPN and Schroedinger’s logs 05:09 PrivateInternetAccess acquisition 05:23 NordVPN 2018 breach 05:50 What are the alternatives? 06:00 Tor 07:25 Self-hosted VPN 07:39 VPN services vs. Self-hosted VPNs 08:58 Choosing a VPS provider 09:18 Virtualisation technology 09:49 Dedicated IPv4 address 10:11 Location 10:43 My choice of the VPS provider 11:25 Creating an account (The tutorial starts here) 11:45 Creating a VPS 12:37 Generating SSH keys 13:46 Updating the packages 14:07 Creating a non-root user 15:04 Configuring SSH 17:14 Installing and configuring OpenVPN 20:50 Installing mosh 21:14 Two-factor authentication 23:53 Automatic updates 25:11 Conclusion
I personally use SoftEther hosted on my vps as my main vpn, while when I want to access something restricted I use VpnGate (which use SoftEther for connections).
Could you make a video on how to make it so i get email notifications whenever i or someone logs into SSH? Subscribed and bought a linode server thanks for tutorial!
I tried your tutorial step by step, but when I tried to activate my VPN from the settings, it said “Connection Failed. Activation of network connection failed”.
Thank you for this great video! While I was following along, an error occurred when I try to use mosh as a replacement of ssh for login: can’t find remote IP address. (is SSH ‘Proxycommand’ disabled?) Where should I enable this option? Also, in “Create an alias for your server” part, should I place the ~/.ssh/config file in my local machine or should I create it after logging into my remote server?Thanks again for this great work!
Thank you for this video WolfGang, I usually rely on typed tutorials but I thought this was so well done that you definitely deserved the full view. Was wondering how you initially got into coding? And how a newcomer may get into it?
Really good tutorial, I was one of the many that viewed the original and thought it good. But this was great and I saved it in my linux folder for those moments I want to set something up like this. And the steps for openvpn and mosh etc was great too thanks!
Thanks for this video. I especially like that you created a text guide to go with it! You have cleared up a lot of the confusion I had around this topic. Much appreciated!
Thank you for this. I set one up that routes to my home network. I have a smb file share set up on a raspberry pi and I wanted access to that. I also am using it to get past my schools firewall
Analyzing TOR traffic, I just wonder how secure it really is? Especially from NSA and also other members of the sigint/digint “club”? Servers joined in a hop scenario, it seems that several exit servers for ex. in europe is deliberitly blocked in a sophisticated pattern. Where traffic also, most probably also is involved in massive timing analysis. These techniques is especially possible when controlling large backbone networks, directly or indirectly through secret agreements.
Great video. Might try this out myself, if only to learn working with lunx and servers in gerneral. Would be interesting to see a video about your linux configuration and programs you are using because I really like its look and usefulness.
That said, I think it would be very helpful if you could please include links to all the documents and web information that you reference in your videos. There are people such as myself that are interested in not only verifying your claims (and anyone else’s for that matter) but also learning more about these issues. I strongly feel that it would add more credibility to whatever case you make much in the way that references and citations do for an academic paper. Other than sharing my one request I have no more to say than thank you for all our work in bringing these topics to our attention.
This video covers many things i was looking for. Amazing video! Keep it up. Just a question, once you setup a server, are you able to use netflix or you need a special configuration to do that ?
Good to know the VPN i subscribe to was bought out by spooky Israli’s – thanks for the heads up Wolfgang – it may be time to consider a change of providers.
2,007 Comments