this post was submitted on 02 Feb 2026
8 points (78.6% liked)

Privacy

45362 readers
174 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 6 years ago
MODERATORS
 

Dont want to self promote, just looking for some feedback on a vpn im building and the thoughts and reasoning behind why i'm doing certain things.

Token instead of account username/password (pretty self explanatory) No 3rd party processor for XMR payments and running my own node Shared exits with 2 locations ( no obvious correlation between 1 user = 1 ip) Wireguard Only for smaller attack surface Endpoint flushing when a handshake is over 10 mins old on wg interface so the user's IP doesnt even live in RAM .onion mirror available which I encourge you to use

I explain other stuff mostly on the FAQ, i encourge everybody to read it please!

top 8 comments
sorted by: hot top controversial new old
[–] ki9@lemmy.gf4.pw 3 points 9 hours ago (2 children)

There are a few monero vpns on kycnot.me... You should consider listing there when you feel ready.

Curious about your upstream... Are they going to send takedown letters for torrent seeding? Are you ready for users to hack with your exit nodes and get blacklisted?

This is the catch-22: non-kyc (anonymous) proxies get abused/blacklisted and become useless for anonymous browsing.

[–] shadowrelay@lemmy.ml 1 points 4 hours ago

Working on implementing snort to capture hacking attempts and taking away their access, its very unfair with other users because the IPs would become technically unusable, captcha on every request.

[–] shadowrelay@lemmy.ml 1 points 4 hours ago

Thanks, i'll do that. I can't really control weather they'll send letters to me or not but what i can do is be honest about it. I do have a warrant canary on the website indicating weather that claim can be made or not without breaking any legal boundaries. No provider is ready for that usecase but it's something you must accept. If i want to fight it, the no log policy can no longer be made. for me to handle abuse, internal logging is required else how would i tell which connection, which internal IP is sending that given traffic. Even for the provider, all IPs in memory inside wg interface is indistinguishable. the more users we have the more anonymous it becomes. More people = more plausible deniability. The only threat model is if the server provider is required to compell with authorites granting them root access and monitoring connection real time getting them a step closer to fiding the possible endpoint to do more monitoring. Takes a lot of effort.

[–] guymontag@lemmy.ml 2 points 10 hours ago (1 children)

Are you running on baremetal or a VPS? Cuz thats seriously important. (Also this looks pretty similar to Mullvad)

[–] shadowrelay@lemmy.ml 1 points 4 hours ago

Vps so far was looking for dedicated options. Service is very cheap, 0.01 xmr for a 3 months sub but im reinvesting every revenue into the service

[–] gaymer@aussie.zone 3 points 15 hours ago (1 children)

Is it proprietary or open source?

[–] shadowrelay@lemmy.ml 1 points 4 hours ago (1 children)

i was definitely planning to put up a section on the website about certain server-side configurations, however the backend is not meant to be open source. It runs with wireguard so theres not much configuration anyways, wireguard is by default not logging any data + as i mentioned i have a script that runs every 5 minutes checking for inactive handhakes, flushing the endpoint after 10 minutes of inactivity removing the endpoint from memory aswell, never gets on the disk anyways, never lives inside the .conf either its all done by a script.