𝕄𝕣ℂ𝕣𝕪𝕡 ㉿ Profile picture
Jul 21 9 tweets 5 min read Read on X
Does a VPN give you privacy?
Only if you know how it works… and choose the right one.
This thread explains everything that matters in 2025

✅ What a VPN really is
✅ How it works
✅ When it helps and when it doesn’t
✅ What to avoid
✅ Scandals, logs, payments & more

Real privacy, no empty promises.
This content is for educational purposes only. I do not promote or justify the illegal use of any tool.
Let’s go 🧵👇

#VPN #Privacy #CyberSecurityImage
What is a VPN and how does it work?

A VPN (Virtual Private Network) creates an encrypted tunnel between your device and a remote server. All your internet traffic goes through that tunnel, hiding what you do online.

What does it achieve?

- Your internet provider (ISP) can’t see what websites you visit.
- It changes your IP, making it look like you're in a different country.
- It protects your data on public Wi-Fi.
- It encrypts your traffic, so others can’t intercept it easily.

Simple example:
Without a VPN: Your ISP sees you accessed x (.)com and the destination IP.
With a VPN: Your ISP only sees you connected to a VPN server. That’s it.

But here’s the catch:
Your VPN can see your traffic. So choosing the right one is crucial.

Wondering “what if I use VPN + Tor?”
VPN + Tor = hides Tor usage from your ISP
Tor + VPN = bypasses site blocks on Tor
But be careful: if misconfigured, you may reduce your privacy instead of improving it.
Tor already offers strong anonymity. A VPN can help in specific cases (like censorship), but it's not always better.
If needed, I’ll explain this in detail in a future thread.
Next up:
✅ Does it really protect you from your ISP?
✅ And what does the VPN actually know?
What does your internet provider see when you use a VPN?

When the VPN is active, your ISP can no longer see:
- Which websites you visit
- Which apps you use
- What you do online
All they see is that you’re connected to a VPN server. Nothing more.
But here’s the catch: the VPN can see all that traffic, because it goes through their servers. That’s why choosing a trustworthy provider is critical.

👉 What should you check?

- A strict no-logs policy (and independent audits)
- The country they’re based in (data retention laws)
- Their privacy record (have they ever cooperated with authorities?)
- Transparency reports and public legal cases

VPNs aren’t magic. They route your traffic, but now your VPN sees it. If you don’t trust your provider, you’ve just moved the problem.

In upcoming posts we’ll explain what “no logs” really means, and how to tell honest VPNs from shady ones.

#VPN #Privacy #CyberSecurity
Not everyone needs a VPN

Despite the marketing, the truth is: it depends on your threat model and how you use it.

WHEN A VPN MAKES SENSE:

✅ To stay safe on public Wi-Fi
✅ To hide your IP from websites and apps
✅ To bypass censorship or geo-blocks
✅ If you live in a country with mass surveillance

WHEN IT CAN BACKFIRE:

⚠️For banking or sensitive logins.
Many banks flag VPN traffic or foreign IPs.
Your account might get locked for “suspicious activity”.
If you're making financial transactions, turn the VPN off or use a local server to avoid raising red flags.

A VPN won’t make you anonymous by default.
It’s a tool for situational privacy, not a magic shield.

How do you use or disable your VPN?
What is Split Tunneling and why does it matter?

Split Tunneling lets you choose which apps or connections go through your VPN and which don’t.

This is super useful if, for example:

🏦You want to stay safe browsing but keep your banking app connected directly without VPN.

Why?

Because many banks block access from foreign IPs (like those from VPNs) for security, which can cause account locks or alerts.

With Split Tunneling you avoid those issues and keep your privacy where you need it.

Remember: using a VPN isn’t “all or nothing.” You can customize it based on your risk and needs.

Do you use Split Tunneling? What cases has it worked for you?
The truth about “No logs”: it doesn’t always mean real privacy.

Many VPN providers claim they don’t keep logs of your activity, but how can you trust their word alone?

Here’s the key difference:

🔒“No logs” policy: a statement that the provider doesn’t store data about you, but often there’s no way to verify it.

🛠️Constant technical verification and dedicated hardware: some providers use servers designed to avoid storing data (“wiped” hardware), with independent audits and 24/7 monitoring ensuring no logs exist.

💳 Also: choose VPNs that accept anonymous payments like @monero or gift cards. Avoid services that force you to use credit cards or submit ID

⚙️ Tip: pick VPNs that use WireGuard or other modern protocols, they’re faster and more secure than legacy options like PPTP or even OpenVPN.

Providers like @mullvadnet , @nymvpn or @ivpnnet stand out for these practices. Some also publish transparency reports and have faced court cases proving they have no data to hand over.
Always check their transparency reports and any legal cases to verify their compliance

Why does it matter? Because if a VPN keeps logs, they can be used to track you, hand over info to third parties, or compromise your privacy.
Not all “no logs” policies are equal: get informed, ask questions, and demand proof.

Would you trust just a statement or prefer real transparency?

#Monero
Why are permissionless decentralized VPNs (dVPNs) often better than centralized VPNs?

Traditional VPNs rely on a single provider controlling servers and data. This creates a single point of failure and vulnerability to censorship, surveillance, or leaks.

In contrast, permissionless dVPNs run on distributed networks with no single controller. This means:

✅ More resistance to blocks and censorship
✅ Lower risk of data collection or leaks
✅ Transparency and trust through blockchain technology and open source
✅ Real user control over data and connections

While newer and with challenges, they represent the future of online privacy
Have you tried any dVPN? What do you think about this innovation?

#dVPN #VPN
When choosing a VPN, not all are created equal.

ProtonVPN is a solid choice with good transparency and security. However, it’s not 100% private, some minimal data logging and cooperation with legal requests mean full anonymity isn’t guaranteed.

Beware of VPNs promising “total privacy” but with shady business models:

❌ Many free VPNs collect and sell your data.
❌ Some popular apps have been caught logging user activity despite “no logs” claims.
❌ Always avoid VPNs without clear transparency reports or independent audits.
🚫 Never trust free VPNs, if you’re not paying, you are the product.
✅ Providers like @mullvadnet , @ivpnnet , and @nymvpn set the bar higher with verified no-logs policies and privacy-first designs

Your best defense is informed choice: check transparency reports, look for audit results, and research any legal cases involving your VPN.

Remember: a VPN can boost privacy but won’t make you invisible. Choose wisely
VPNs are powerful tools, but only when used right.

Don’t fall for marketing. Know your needs, choose your provider wisely, and combine tools for real privacy.

This thread is part of a broader privacy series.
More guides are coming: firewalls, metadata and beyond.

Follow for more privacy content and share this thread if you found it useful
Let’s help more people take control of their digital lives.

#VPN #Privacy #OpSec

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with 𝕄𝕣ℂ𝕣𝕪𝕡 ㉿

𝕄𝕣ℂ𝕣𝕪𝕡 ㉿ Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @MrCrypPrivacy

Jul 18
What’s an IMSI Catcher?
Devices that mimic cell towers to track, locate or spy on you without you noticing.
This thread explains (clearly and simply)

How they work
How to detect them
How to protect yourself
Why 2G (GSM) matters
And how Faraday bags help

This content is for educational purposes only. I do not promote or justify illegal use in any way.
🔐 Real mobile privacy
Let’s begin🧵👇

#IMSI #GSM #MobilePrivacyImage
In the previous thread, we saw how the IMEI and IMSI can be used to track and identify your phone.

Now let’s go a step further:

👉 What if I told you there are devices that can capture that data without your consent?

They’re called IMSI Catchers.
And they’re much closer than you think.

📎 In case you missed the previous thread:
x.com/MrCrypPrivacy/…
An IMSI Catcher is a device that acts as a fake mobile phone tower.
It impersonates a legitimate antenna so your phone unknowingly connects to it instead of the real network.

Why is this so dangerous? Because it can:

- Capture your IMSI (your SIM card’s unique identity).
- Log your IMEI (your device’s unique identifier).
- Track your exact location in real time.

Intercept calls, messages, and even data traffic (on advanced models).

These devices are used for espionage, mass surveillance, or targeted attacks, often operating without your knowledge.

This type of attack is known as a “man-in-the-middle” (MITM) attack, as the IMSI Catcher positions itself between your phone and the network, controlling all communication.

What’s most alarming is that many networks, especially older ones like 2G (GSM), lack protections against these attacks, making them easier to exploit.

In recent years, IMSI Catchers have been used worldwide by governments and malicious actors to spy on activists, journalists, and civilians, such as during protests in several countries. These real cases highlight how close this threat is.

In upcoming tweets, I’ll explain how to detect them, how to protect yourself, and why 2G remains a critical attack vector.
Read 9 tweets
Jul 16
Think turning off your phone protects you?

Your device carries two unique codes that follow you everywhere.
You can’t change them. You can’t hide them.
IMEI and IMSI.

Every time your phone connects to a mobile network, it leaves a trace.
No apps needed. No browsing. Just sitting in your pocket.

These IDs reveal:
- What phone you use
- Which tower you connect to
- Where you are
- Which line is yours
- When you swap SIMs
- Even who was nearby

This thread explains what IMEI and IMSI are, why they’re dangerous for your privacy, how they track you, and how to reduce that risk.

Let’s go 🧵👇Image
What’s IMEI?

The International Mobile Equipment Identity.
A unique number hardcoded into your device, like a license plate.
You can’t change it easily.
Used to:
- Identify your phone
- Block stolen devices
- Link your movements to the same device, even with a new SIM

What’s IMSI?

The International Mobile Subscriber Identity.
Stored on your SIM card, it ties your line to your network.
It reveals:
- What SIM you’re using
- Who your provider is
- If you changed SIMs
- If it’s still the same person (based on phone or behavior)

IMEI + IMSI = complete surveillance.
Now that you know how they track you on the network level, what can you do with your phone to reduce your footprint?

I talked about it in this other thread where I explain step by step how to set up your phone so it stops being a spy in your pocket
Read 6 tweets
Jul 15
Your browser spies on you.
But your phone… it gives you away.

It knows where you are, who you’re talking to, when you sleep, what you want, and what you fear.
Even turned off, it keeps gathering info

But you’re not tied to this system.
You can take back control.

The ideal: Google Pixel + @GrapheneOS
It’s the most private combo you can get nowadays.
But if you don’t have a Pixel, you can still harden your current Android with these tools.
The important thing is to start

Here’s apps to make your phone more private (without going crazy)👇

#Privacy #DigitalSecurityImage
App stores (outside Google Play)

- Aurora Store (anonymous downloads from Google Play)
- Obtainium (updates FOSS apps from GitHub)
- F-Droid (repo only for open source apps)

Browsers

- @brave
- Vanadium

Search engines

- Brave Search
- @mojeek
- @startpage

Email

- @TutaPrivacy (formerly Tutanota) encrypted, no tracking, no Google.
Notes

-Notesnook
-Standard Notes
(both end-to-end encrypted and cross-platform)

YouTube without tracking

- NewPipe (no ads, no Google connection)

Weather

- Breezy Weather (no calls to big APIs)

Keyboard

- Heliboard (total privacy)
- Simple Keyboard (total privacy)

Two-factor authentication (2FA)

- Aegis (local encryption, offline)
Read 5 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(