this post was submitted on 03 Apr 2026
327 points (99.1% liked)
Technology
83406 readers
3901 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Those are the ones that would cause them to surveil you.
The issue isn't necessarily "the government will target you for using a VPN;" the issue is "if your IP makes you look like you're outside the US because that's where your traffic exits the VPN, the laws against domestic spying won't protect you properly because you'll look like a foreigner."
Frankly, the headline is heavily spinning it to be anti-VPN fearmongering.
Privacy companies based outside the US can still have VPN servers within the US. That traffic would still look domestic. The company being owned and headquartered outside the US just gives them a bit more protection against the rogue US government.
Some VPNs also allow multi-hop, so that you can connect to one VPN server via another. That could make it harder for the spooks to see that your traffic is leaving the US. Of course it also means that they might suspect any traffic coming out of a VPN server even based in the US, which is basically the point of this article.
And some VPNs allow you to enable a feature that protects against AI-driven data traffic analysis. So that someone who's really committed can't just monitor the size and frequency of your outgoing encrypted packets, then find matching patterns in packets leaving the server you're connected to, tracing it to the destination. Instead, the VPN adds noise and sends uniform packets so that AI can't trace it from source to destination.
I don't know if Nord offers these features, cause I don't use Nord. But I've heard some issues about them, which other user's have already mentioned and offered alternatives for, so I'll leave it at that
Yeah, sorry, I wasn't as precise as I could've been. I was really just trying to convey the motivations (i.e. that it was due to being mistaken for foreign as opposed to being targeted for using a VPN), not go into the details of exactly which aspect of the VPN (the entrance IP geolocation, the exit IP geolocation, or the company HQ location) would actually trigger the "foreign-ness."
Yeah I reacted way too quickly. Then I realized half of X bot traffic spoofs everywhere. They're intentionally doing a shakeup of everything and this one got under my skin cause I'm a daily user.
But before this was that outside US router ban that was pretty real. The DJI ban. So these types of news cascade and its worrisome.