Voyager@psychedelia.ink to Technology@lemmy.worldEnglish · 2年前We have successfully completed our migration to RAM-only VPN infrastructure - Mullvad VPNmullvad.netexternal-linkmessage-square93fedilinkarrow-up1792arrow-down18
arrow-up1784arrow-down1external-linkWe have successfully completed our migration to RAM-only VPN infrastructure - Mullvad VPNmullvad.netVoyager@psychedelia.ink to Technology@lemmy.worldEnglish · 2年前message-square93fedilink
minus-squaresebsch@discuss.tchncs.delinkfedilinkEnglisharrow-up3·2年前But why would logs you hurt than? How to debug and how to do forensic if only the supposed persons are connected to your home, if you don’t have any logs?
minus-squarejarfil@lemmy.worldlinkfedilinkEnglisharrow-up2·2年前VPNs prevent your origin ISP from keeping logs; you may not want your office, school, coffee shop, city wifi, etc. to know which services you’re accessing. You can (should) still require identification on your home hosted services, you can log that.
But why would logs you hurt than?
How to debug and how to do forensic if only the supposed persons are connected to your home, if you don’t have any logs?
VPNs prevent your origin ISP from keeping logs; you may not want your office, school, coffee shop, city wifi, etc. to know which services you’re accessing.
You can (should) still require identification on your home hosted services, you can log that.