this post was submitted on 03 Apr 2026
358 points (99.2% liked)
Technology
83406 readers
2917 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Privacy companies based outside the US can still have VPN servers within the US. That traffic would still look domestic. The company being owned and headquartered outside the US just gives them a bit more protection against the rogue US government.
Some VPNs also allow multi-hop, so that you can connect to one VPN server via another. That could make it harder for the spooks to see that your traffic is leaving the US. Of course it also means that they might suspect any traffic coming out of a VPN server even based in the US, which is basically the point of this article.
And some VPNs allow you to enable a feature that protects against AI-driven data traffic analysis. So that someone who's really committed can't just monitor the size and frequency of your outgoing encrypted packets, then find matching patterns in packets leaving the server you're connected to, tracing it to the destination. Instead, the VPN adds noise and sends uniform packets so that AI can't trace it from source to destination.
I don't know if Nord offers these features, cause I don't use Nord. But I've heard some issues about them, which other user's have already mentioned and offered alternatives for, so I'll leave it at that
Yeah, sorry, I wasn't as precise as I could've been. I was really just trying to convey the motivations (i.e. that it was due to being mistaken for foreign as opposed to being targeted for using a VPN), not go into the details of exactly which aspect of the VPN (the entrance IP geolocation, the exit IP geolocation, or the company HQ location) would actually trigger the "foreign-ness."
I mean, even a US-based VPN company could look foreign if they have servers outside the US, or even if they just allow multi-hop to third-party servers to/from outside the US.
Except then they're even more vulnerable not only to subpoenas but also extrajudicial and unconstitutional raids, as some journalists have discovered, especially in deeply red states but not always...