← Back to Library

Akshually! You should always use a vpn!

The Hated One delivers a provocative twist on a familiar privacy debate: while most experts urge you to use a Virtual Private Network, this author argues that almost all of them are useless against modern surveillance. The piece stands out not for dismissing privacy tools entirely, but for pinpointing a specific, often overlooked vulnerability—traffic analysis powered by artificial intelligence—and identifying a tiny handful of providers that have engineered defenses against it.

The Great VPN Lie

The core of the argument is that standard encryption is no longer enough. The Hated One writes, "They're making you believe that when you use a VPN, you hide your traffic from the prying eyes. But you're not hiding your traffic from anybody." The author explains that while a Virtual Private Network hides your Internet Protocol address from the destination website, the provider itself sees every packet you send. This creates a single point of failure where trust is required but verification is impossible.

Akshually! You should always use a vpn!

The commentary here is sharp and necessary. It cuts through the marketing fluff that saturates the industry. By stating, "You're basically trusting them not to collect your internet history. They may promise not to do it, but you have no way of verifying that promise," The Hated One forces the reader to confront the reality that privacy is often a business model, not a technical guarantee. Critics might note that this view is somewhat cynical, ignoring that many providers have independent audits or are based in jurisdictions with strong privacy laws, but the fundamental point about the lack of user-side verification remains valid.

The Invisible Fingerprint

The piece then pivots to the technical heart of the problem: traffic analysis. The Hated One describes how data packets travel in unique patterns of size, timing, and direction. "Every website you go to will have its set of packets that will form a pattern of different sizes, timings, and directions," the author notes. This pattern, or "website fingerprint," allows observers to identify which site you are visiting even if the content is encrypted.

This is the most distinctive part of the coverage. It moves beyond the old debate of "is my data encrypted?" to the more complex question of "can my behavior be identified by the shape of my data?" The Hated One illustrates this with a chilling example regarding messaging apps: "If you send an image to your signal contacts, there will be a sudden spike in the traffic and the adversary will be able to detect that you just sent an image in your chat." The argument gains weight by highlighting the role of deep learning. As the author puts it, "AI is being deployed by companies and government agencies to spy on our traffic and decipher what we do, even when our connections are encrypted."

Knowing every single one of them is kind of difficult. But the most popular websites, the ones you visit every day, their fingerprints are easily recognizable.

The author's explanation of how artificial intelligence correlates these patterns to de-identify anonymous users is compelling. It suggests that traditional anonymity networks like Tor are also vulnerable to this advanced analysis. This reframes the entire privacy landscape, suggesting that without specific countermeasures, encryption is merely a speed bump for modern surveillance, not a wall.

The Handpicked Defense

Having dismantled the status quo, The Hated One offers a solution, though it is highly selective. The argument is that only a few providers have implemented defenses like dummy packets, traffic imitation, and mixnets. The author highlights two specific services: Mullvad and Nim. Regarding Mullvad, the text states, "MullvadVPN is one of the longest trusted VPN providers that just started doing that," referring to their new protocol that injects random noise and standardizes packet sizes.

The commentary on Nim is even more enthusiastic. The Hated One describes it as "like a machine laundering your data and obfuscating it by rerouting your traffic through five noise generating mixnet hops." This section is crucial because it moves from abstract theory to actionable advice. However, the author is honest about the trade-offs. "They are actually quite resource intensive," The Hated One admits, warning that these defenses drain battery life and data plans. This nuance adds credibility; the author isn't selling a magic bullet but a tool with real costs.

A counterargument worth considering is whether the average user can or should manage these complex settings. The Hated One acknowledges this by suggesting users start on a PC before trying a phone, but the barrier to entry for true privacy remains high. Furthermore, the claim that these specific providers are the only ones capable of this defense might be an overstatement, as the privacy landscape evolves rapidly and other providers may be developing similar features off the record.

Bottom Line

The strongest part of this argument is its focus on traffic analysis as the next frontier of surveillance, a topic often ignored in favor of simpler encryption debates. The Hated One's biggest vulnerability is the reliance on a very small, handpicked list of providers, which could be seen as self-promotion despite the author's insistence on independence. Readers should watch for whether these advanced defense protocols become industry standards or remain niche features for the privacy-obsessed.

Sources

Akshually! You should always use a vpn!

by The Hated One · The Hated One · Watch video

This is why you should always use a VPN today or it can also look like this. Very few VPNs can actually do this and those that can't are virtually useless. So, what is this? I'll show you not only that, but also why VPN are pretty much a waste of money, except for the very few that can actually do this sort of magic that I'm showing here, and I'll tell you which ones they are.

So, let's begin. And no, this video is not sponsored by a VPN or anyone for that matter. I've been using virtual or private networks ever since I started my privacy journey, which was when Edward Snowden leaked the NSA surveillance files. The reason to use a VPN was immediately clear.

The global network of intelligence agencies is spying on all of our phone records and internet histories, and they aren't doing it by Clintenstein hacking operations. They get data directly from internet companies who collaborate with the surveillance state willingly. It was necessary to prevent internet companies from having immediate access to all of our records. And in a limited sense, VPN worked for a while.

But from the moment I started using VPN, I also realized they actually have a major flaw. A flaw that makes them not private at all, not to mention anonymous. What's that flaw? Well, it's not just a flaw.

It's an outright lie. What the VPN companies are selling you in those sponsored YouTube segment is a complete fabrication. They're making you believe that when you use a VPN, you hide your traffic from the prying eyes. But you're not hiding your traffic from anybody.

The VPN company sees your full traffic and it's impossible for them not to see it. They know who you are because they always know your true real IP address and they know every single website you go to because they're routing your traffic for you. You're basically trusting them not to collect your internet history. They may promise not to do it, but you have no way of verifying that promise.

And those prying eyes can easily compromise your VPN provider and steal your internet records from them instead of your ISV. This was always obvious and it baffles me that I was the only one saying this until I made it a monetizable trend on YouTube because it was ...