ghacks.net

smeg, to privacyguides in Brave appears to install VPN Services without user consent

I think you’ve double-posted

throws_lemy,
@throws_lemy@lemmy.nz avatar

I have deleted the previous post, but there seems to be a synchronization problem with other instances

smeg,

Yeah, weirdly it shows up as a cross-post to the same community but not every client shows them both at once. I’ve seen it before and I think it was to do with cross-instance syncing then as well.

glad_cat, to privacyguides in Brave appears to install VPN Services without user consent

The same company that was modifying the content of the pages as an opt-out feature deeply hidden in the setting? (e.g. bitcoin stuff on every Reddit link)

whofearsthenight,

Surely you trust them with all of your traffic, though? They sound like good stewards and of course you’d want their VPN installed without your consent and you can definitely trust it’s not doing anything bad, right?

Vincent, to privacyguides in Brave appears to install VPN Services without user consent

Well, there's a way to frame this as malicious. I'm not a fan of Brave, but it also installs, say, a spell checker without consent, or a Tor client. Sure, the code is there even if you don't use it, but... What's the actual harm?

glad_cat,

The harm is that it’s installed. There is no reason for doing this. It can be done on demand in one second if the user subscribes to their VPN.

It also shows once once again that they keep on doing their shady shit and still cannot be trusted (or at least that they are a bunch of incompetent developers).

DarkenLM,

You know Firefox installs a bunch of stuff by default as well, right?

Scary_le_Poo,
@Scary_le_Poo@beehaw.org avatar

Such as?

DarkenLM,

Firefox also installs telemetry and data reporting functions like most browsers, also libraries like libwebp, which are prone to critical vulnerabilities (as seen), encryption systems like Encrypted Client Hello, and software like Pocket, which some users never use, but it's still there.

Any browser will install many features that probably won't be used. Saying that a browser that installs a feature like Tor or VPN (which aren't even hidden, Brave publicly present those features) is automatically bad doesn't sound reasonable to me.

whale,
@whale@lemm.ee avatar

deleted_by_author

  • Loading...
  • DarkenLM,

    The point I'm making is that it's not like Brave installed the VPN in secret, hidden away to it's own devices. The code is there and a service is installed, sure, but it's dormant until the user activates it.

    whale,
    @whale@lemm.ee avatar

    deleted_by_author

  • Loading...
  • DarkenLM,

    I guess they place it in the installer to make it easier to update? Note, I never used Brave in my life, so I don't really know how it works.

    dukethorion,
    @dukethorion@lemmy.world avatar

    They don’t want to hear that.

    Vincent,

    I mean, yes, it could've been differently, and as I understand it they're going to. But as a user, how is your life worse with this than without this? What's the impact of something being installed but not running?

    Teon, to privacyguides in Brave appears to install VPN Services without user consent
    @Teon@kbin.social avatar

    You get what you deserve if you use Brave. It will only get worse.

    penquin, to privacyguides in Brave appears to install VPN Services without user consent

    I’ve discovered a new browser to use as a secondary one to Firefox in case I needed a chromium based one. Thorium. This thing is insanely fast. Brave what?

    HubertManne,
    @HubertManne@kbin.social avatar

    Ive liked iron. it doesn't look to do anything but remove da google.

    Norgur, to privacyguides in Brave appears to install VPN Services without user consent

    Okay, this article makes it sound like they found some hidden thing deep in obscure windows settings about brave doing something bad.

    On truth, they just installed Windows Services for their VPN to enable users to use the service. That's what many apps do for dozens of reasons.

    I dislike Brave as much as the next guy, but let's stick to things they really fuck up and not make Up issues that aren't there.

    krellor,

    I agree it is people looking for reasons to criticize. However, I do think VPN or anything that modifies your route tables should be subjected to more scrutiny than other app features due to potential for abuse. I wish browsers wouldn't bundle them at all, or install them as part of their base.

    MonkCanatella,

    Especially considering they were injecting affiliate links/replacing affiliate links with their own, everything they do should be seen through that lens. They literally thought it was either OK to do which means that behavior like this is going to happen and keep happening with them, OR they thought they could get away with it which ends up with the same result.

    randomaside, to privacyguides in Brave appears to install VPN Services without user consent
    @randomaside@lemmy.dbzer0.com avatar

    I originally started using brave because at the time it was the most feature complete alternative to chrome. Now I would like to switch but I would still use chrome cast for music streaming (I have quite a few of them).

    Last time I checked casting audio was missing as a feature in most deGooogled versions of chrome. Does anyone have any suggestions for browsers that allow me to stream audio from my browser to Google Chromecast?

    iSeth,

    Can you stream audio from VLC?

    governorkeagan, (edited ) to privacyguides in Brave appears to install VPN Services without user consent

    I’m clearly out of the loop with the hate towards Brave. Why all the hate? Also, if it’s hated so much why is it still recommended on Privacy Guides?

    EDITThank you for all the informative responses!

    witchdoctor,

    Also, if it’s hated so much why is it still recommended on Privacy Guides?

    Non-unironically, Brave paid shills.

    sir_reginald,
    @sir_reginald@lemmy.world avatar

    Why all the hate?

    Have you read the article? They install their VPN before the user decides to use that service, when they could simply install it when the user decides to subscribe to their VPN.

    I’m going to be downvoted for this but it’s recommended on privacy guides because they generally lack strict criteria with browsers. Both Firefox and Brave make automatic connections that shouldn’t be allowed.

    ghazi,
    @ghazi@mastodon.tn avatar

    @governorkeagan @throws_lemy Privacy Guides has a set of objective criteria to judge a browser's security and privacy. People tend to hate Brave for reasons unrelated to security and privacy. Like the CEO's politics, crypto (and recently AI) integration in the browser, some shady history about injecting referral codes, etc.
    Personally, I wish I could find an alternative that is as good as Brave. Until then, I'll keep using it as it is perfect for my needs.

    Eggroley, to privacyguides in Brave appears to install VPN Services without user consent
    @Eggroley@lemmy.world avatar

    I mainly use brave as an alternative browser for when things are acting a bit iffy on Librewolf.

    Yesterday I saw their VPN service running on the task manager. Hadn’t used brave for a week. Immediately uninstalled.

    IronKrill, to privacyguides in Brave appears to install VPN Services without user consent

    Open article -> get prompted for notifications and full-screen cookie consent pop up -> deny notifications -> click through cookie menu, accept -> finally see article for .5 nano seconds -> trending articles popup -> click the x on trending -> tab crashes.

    I think I know why people only read the headline nowadays.

    AdventuringAardvark,

    If you use uBO on medium mode, you don’t see any notifications, consent banners or pop-ups.

    Scary_le_Poo, to privacyguides in Brave appears to install VPN Services without user consent
    @Scary_le_Poo@beehaw.org avatar

    Thank fuck for Firefox reading mode

    full article because this site sucks fucking cock

    www.ghacks.net Brave appears to install VPN Services without user consent - gHacks Tech News Martin Brinkmann 3 - 4 minutes

    If you have the Brave Browser installed on your Windows devices, then you may also have Brave VPN services installed on the machine. Brave installs these services without user consent on Windows devices.

    Brave Firewall + VPN is an extra service that Brave users may subscribe to for a monthly fee. Launched in mid-2022, it is a cooperation between Brave Software, maker of Brave Browser, and Guardian, the company that operates the VPN and the firewall solution. The firewall and VPN solution is available for $9.99 per month.

    Brave Software is not the only browser maker that has integrated a VPN solution in its browser. Mozilla, maker of Firefox, entered into a cooperation with Mullvad and launched Mozilla VPN in 2020. Brave Browser’s installation of VPN services on Windows

    Brave Browser Windows VPN Service

    A post on Privacy Guides suggests that Brave Browser installs its VPN Service without user consent and regardless of whether the VPN is used or has been used in the past.

    You can verify this easily by following these steps:

    
    <span style="color:#323232;">Use Windows-R to open the Run box.
    </span><span style="color:#323232;">Type services.msc to open the Services manager on Windows.
    </span><span style="color:#323232;">Scroll down until you come to the Brave section there.
    </span><span style="color:#323232;">Check for Brave VPN Service and Brave VPN Wireguard Service.
    </span>
    

    If they exist, Brave has installed the services on your device. If you were never subscribed to Brave Firewall + VPN, the company may have done so without your consent.

    The two services have no description, the startup type Manual and Manual Trigger Start.

    There is no explanation why these services got installed on the system. Cautious users may set the two Services to disabled:

    
    <span style="color:#323232;">Right-click on one of the services and select Properties.
    </span><span style="color:#323232;">Switch the Startup type from Manual to Disabled.
    </span><span style="color:#323232;">Repeat the process for the second VPN service.
    </span>
    

    Deleting the Windows services is another option. The main issue here is that there is no guarantee that a browser update won’t install the Services again. You’d need to monitor the services whenever Brave Browser updates to make sure of that.

    Some users who replied to the discussion on Privacy Guides said that they did not have these services installed.

    Closing Words

    Why are the VPN services installed in first place? Brave made no announcement in this regard. Maybe so that users can start using the VPN immediately on Windows and not after a restart.

    In any event, you now have the tools at hand to check for the services and either disable or delete them.

    Now You: do you use Brave Browser?

    Summary

    Brave is installing VPN Services without user consent

    Article Name

    Brave is installing VPN Services without user consent

    Description

    Brave Software appears to be installing VPN services on Windows devices without user consent during Brave Browser updates.

    Author

    Martin Brinkmann

    Publisher

    Ghacks Technology News

    Logo Ghacks Technology News

    Advertisement

    Oha, to piracy in qBittorrent 4.6 launches with I2P support - gHacks Tech News

    can someone eli5 i2p to me?

    RyeMan, (edited )

    Others have summarized it well but I’ll add my perspective also.

    I2P is a decentralized network of peers. All traffic gets routed through multiple peers before reaching its destination. Traffic is also encrypted by multiple layers of encryption and each connected peer can only decrypt one layer, that layer will only contain further routing info so that peer knows the next place to hand off your data. The encryption gets stripped layer by layer until it finally reaches its destination.

    What this ultimately means is that by interacting with a website or service through I2P it is virtually impossible to identify any information the user is sending or receiving and it is also impossible to tell where the connections are going or coming from.

    To make things even more interesting all I2P routers by default also contribute resources back into the network so while your I2P Router is handling your communication connections, it’s also volunteering to be a connection node in someone else’s connection. This adds further security because now you’ve got many Peer to Peer connections going in and out of your network, all encrypted so any prying eyes will have an exceedingly difficult time trying to make sense of any of your internet traffic.

    Tor relies on the good faith of its community to contribute resources to the network and it’s not very well incentivised causing its resources to be far more limited and bogged down. For this reason, Tor cannot sustain heavy torrent traffic without easily being overwhelmed. In I2P, every user is a contributor so the more people who use I2P, the faster and better it becomes.

    The big advantage Tor has over I2P are outproxies and the beautifully prepacked Tor Browser. Tor has a lot more influence and money backing it so there are some large and well protected entities that can afford all the legal trouble that outproxies can bring. Unfortunately there just isn’t enough money or legal support in the I2P community to reliably support outproxies even though I2P already has full support for it.

    I2P is a fantastic tool for private communication across the Internet and the true ELI5 here is I2P natively supports “anonymous” torrenting (even encouraged it as it strengthens the network further) and will do so privately and securely without any need for a VPN. Adding support to QBittorrent makes it even easier to access I2P torrenting with very minimal set up required.

    The only catch here is you can’t go around downloading any old torrent from the Internet on I2P, someone needs to actually be seeding that torrent on the I2P network for you to get any data. There are fully functioning tracker sites exclusively within I2P that have a huge catalog of content but all is not lost for “clearnet” torrents either. Software like BiglyBT and now QBittorrent, allows users to “bridge” or “cross seed” torrents across the two networks, that way content is shared no matter what network you’re a part of.

    BiglyBT has been doing this for a while now but I’m so happy to see QBittorrent finally embracing this as well.

    EDIT: geti2p.net/en/

    Oha,

    So its basically the cooler Tor? Thanks for explaining

    WarmApplePieShrek,

    Cooler and less cool because no exit nodes. It’s fully separate from normal internet.

    ninchuka,

    There are exit nodes, called out proxies but routers have to set them up themselves

    Strict3443,

    The most known outproxy: stormycloud.org/i2p-outproxy/

    eya,
    @eya@lemmy.dbzer0.com avatar

    Most private trackers ban BiglyBT, hope the same doesn’t happen to QBittorrent

    KinNectar,
    @KinNectar@kbin.run avatar

    @eya

    Why do they ban it?

    shadearg,
    @shadearg@lemmy.world avatar

    Why do they ban it?

    Issue

    nix,
    @nix@merv.news avatar

    That links to a link to a forum with a ton of replies? Can you just copy paste the reason?

    flamingarms,

    Took a quick look at the first few messages and the links: seems like BiglyBT is banned by a lot of private trackers because it’s possible to mod it to spoof the numbers required to stay a member in the private tracker, while also being able to create a torrent file that allows others using the mod to utilize the private tracker without permission. Not sure if any of that functionality has to do with I2P.

    ninchuka,

    Would that not be possible in every other client? Or is it just the easiest to do with BiglyBT?

    WarmApplePieShrek,

    You can mod any open source client to cheat but most of them don’t give you buttons to do it.

    Fjor,

    Thanks for such a detailed answer! How does the I2P speeds compare to running torrents over VPN? I assume its a lot slower?

    WarmApplePieShrek,

    I2P is separate from normal internet. It’s not an alternative to VPN.

    Fjor,

    Yeah thats fine, I was just wondering how the speed varied from one solution to the other.

    Strict3443,

    From my experience, some popular I2P torrents have gotten up to 1 MB/s download, but I usually average around 200 KB/s. While it is not blazing fast, it does provide a good deal of anonymity for everyone involved with the torrent.

    Also, you can lower the anonymity and increase speeds by reducing the number of hops from 3 to 2 or 1. You can choose how “anonymous” you’d like to be while torrenting, at the cost of speed.

    RyeMan,

    It varies wildly between torrents based on activity of the torrent and your I2P tunnel settings. Participation on I2P torrents is definitely significantly lower than normal clearnet torrents (at the moment) so a lot of times there are only 1-2 peers available which often results in roughly 35-60 KB/s but I’ve also seen some more popular torrents download at nearly 1 MB/s. I2P can self update from a torrent, that file generally has high participation, and on average, downloads at speeds above 150 KB/s. There definitely is some bandwidth lost just due to overhead of running the network, fewer hops and more tunnels helps with that though. I usually run about 10 tunnels with Snark, all with 3 hops. If I reduce that to two hops I can still have good privacy but with significantly less bandwidth overhead, I just personally feel the extra privacy of three hops is worth the sacrifice.

    Speed and bandwidth rely heavily on the level of participation, more high-bandwidth peers torrenting over I2P will significantly speed things up. With my current setup, my router pushes around 450 KB/s on average just for participating traffic (traffic that is only contributing to other I2P peers) so it’s definitely capable of comparable speeds to that of a VPN.

    Oh and I should have mentioned this before, torrenting over I2P also helps strengthen your connection to the I2P network because it introduces you to more high-speed peers to communicate with. Really speeds things up if you’re trying to bootstrap a new I2P router

    I2P has quite a few internal torrents with large swarm sizes that you can stress test pretty reasonably with. Another fun thing you can try if you are using I2P Snark (java I2P built-in torrent handler), you can paste magnet links from the clearnet into your client and if you’re lucky some beautiful people out there are cross seeding that torrent and it’ll allow you to take part in downloading clearnet torrents over I2P.

    PeachMan,
    @PeachMan@lemmy.world avatar

    So, if I set up an I2P router on my network and use Qbittorrent, would it theoretically be possible to contribute to I2P using the torrents that I already seed? Or is it not that easy?

    WarmApplePieShrek,

    I2P router means the I2P software on your computer. You don’t have to buy a new router.

    Strict3443,

    You can cross-seed torrents by adding I2P trackers to the tracker list. What helps is when you upload the .torrent file to tracker2.postman.i2p (the only? i2p public torrent tracker) so that others can find the magnet/torrent link and start downloading. That way people can find the InfoHash and also have trackers embedded in the i2p .torrent file to allow you to find seeders.

    Some info on this subject: old.reddit.com/…/how_to_correctly_cross_seed_to_m…

    ninchuka,

    Theres a few public trackers, check http://notbob.i2p and click the magnet

    Strict3443,

    What I mean is if I create a new torrent of Big Buck Bunny with a InfoHash of b1946ac92492d2347c6235b4d2611184 for example, no one will find my torrent by searching for “Big Buck Bunny”. Unless I post this hash somewhere, advertising “Hey, this torrent is Big Buck Bunny” like what 1337x and other torrent sites do, you won’t “find” it. Basically, we have to use a torrent indexer like tracker2.postman.i2p to search the metadata and find torrents we want. If that makes sense.

    ninchuka,

    I’ve seeded clearnet torrents to I2P peers many times with BiglyBT without those torrents having I2P trackers, so it’s definitely possible

    Strict3443,

    It would be nice to have qBittorrent auto add I2P trackers to all torrents to help cross-seed them.

    ninchuka,

    That would be nice yeah, maybe have a list of trackers in the options the user can control to add to torrents automatically

    RyeMan,

    I2P has its own DHT so all you need is an InfoHash to start downloading assuming there’s at least one reachable seeder. MuWire is an application that lets you search the DHT. The developer recently abandoned the project though… I haven’t tried it in some time but it probably still works.

    Strict3443,

    I’ll check out MuWire, was unaware that it used DHT.

    Also, I am just saying that tracker2.postman.i2p is the only torrent directory we have currently, and its best way to find and advertise torrents for others. Trackers (where your client announces to) are helpful to finding peers of the same torrent.

    Fjor,

    You my man, have a brain the sized of a planet! Thanks for all the explanations! ✨

    helios,
    @helios@social.ggbox.fr avatar

    Very cool, thanks for sharing.

    lemmyingly,

    To summarise, I2P is similar to Tor, except that every client also serves as a node, and there are no exit nodes, so you can only access data shared by other I2P clients

    Is my summary correct?

    ninchuka,

    You can have exit nodes, called out proxies on I2P they just have to be manually setup

    obinice,
    @obinice@lemmy.world avatar

    So it’s like Kazaa, kinda? Are we basically going back to the decentralised P2P days? :-D

    Agent641,

    How are nodes chosen by the client?

    What stops governments/LEO/copyright dragons from spinning up thousands of the fastest/most accessable i2p nodes so that clients connect to them first, then these hosts log the traffic paths to identify origin/destination?

    Strict3443,

    geti2p.net/en/docs/how/threat-model#sybil

    Good write-up from the I2P team on this topic. Page includes other attack vectors as well.

    ComplexLotus,

    All traffic gets routed through multiple peers before reaching its destination

    • I wonder why the whole internet is not designed like this.
    • if we designed basic protocols like TCP and UDP with user privacy (in practice hiding his IP-Adress) as the most important point we would have a more secure internet I currently think… or am I wrong here?
    OsrsNeedsF2P,

    It’s a dark network. Instead of going to a website, you go to an “eepsite”, and to get there you securely route through a bunch of random computers (as if you went through 10+ VPNs). It’s similar to Tor, but the main difference Tor’s primary goal is to visit websites (on Tor, “onion sites” exist, but unlike I2P, “onion sites” are not the primary focus of Tor).

    dmonzel,

    From the article that was posted:

    The main new feature is support for I2P, the Invisble Internet Project. It uses a fully encrypted privacy network layer to hide user activity and locations. The network does not use servers. Peers contributed “a portion of their resources” to other network particpants.

    The maintainers promise that “non one can see where traffic is coming from, where it is going, or what the contents are” when the Invisible Internet Project is active.

    gd42,

    If it doesn’t use servers, where is the content stored? Or stuff just disappears when a user whose computer used to serve the files is turned off?

    WarmApplePieShrek,

    It’s BitTorrent. There are seeders.

    I2P has servers to run websites, but they mean I2P itself has no central servers that control it, like Tor does.

    deweydecibel,

    What about private trackers that monitor your ratio? Can they still see that?

    WarmApplePieShrek,

    Private trackers see your ratio because your client tells it to them. If you cheat, you get banned. They can tell you cheat because the seeder reports upload but you don’t report download. You must not use private tracker torrents except on their tracker because it looks like cheating because the other client isn’t connected to their tracker, and you will get banned.

    ohitsbreadley,

    Maybe I’m a smooth brain - but I always thought private trackers were kept private/exclusive as a way of promoting seeding - the exclusivity of private trackers lowers risk/fear of seeding, so people seed, files are kept alive. - the ratios are a stick to enforce the rules and boot leechers. Centralizing seed logs with private trackers always gave me the creeps though.

    Honestly, it sounds like there’s essentially no risk of seeding on I2P. Wouldn’t more people be willing to seed in general? And wouldn’t that in turn obviate the need for private trackers?

    Alas, perhaps my smooth brain brings naivety along with it.

    WarmApplePieShrek,

    Private trackers promote seeding, but people don’t seed for more reasons than getting caught. Public trackers are leechfests. Some of my public torrents, I have ratio 30 and I’m still the only seeder. Why should I bother with this, if nobody else will? I should put the torrent on a private tracker where other people will help spread it, and stop public seeding.

    Strict3443,

    This is a good point. I also feel like private trackers are meant for people who actually seed content they download, and just have good intentions to help share content. This also comes with hardware requirements (disk space) sometimes that not everyone has.

    RobotToaster, to piracy in qBittorrent 4.6 launches with I2P support - gHacks Tech News

    Will it be enabled by default?

    valveman,

    It’s not enabled in the 4.6 beta version, I think they’ll keep it that way

    OsrsNeedsF2P,

    Probably not. I2P doesn’t connect to the clearnet like Tor does, it only works if the destination is on I2P as well.

    sir_reginald,
    @sir_reginald@lemmy.world avatar

    I2P does connect to the clearnet, it just doesn’t by default.

    Outproxies are available and you can even host your own routing it through Tor. That way you get the best of both networks.

    WarmApplePieShrek,

    Useless for torrenting - you’ll overload the outproxy.

    ReversalHatchery,

    It requires running additional software, a so called “I2P router”.
    This can be ran on Linux and Windows systems too, on localhost or for your local network.

    arisunz, (edited ) to piracy in qBittorrent 4.6 launches with I2P support - gHacks Tech News
    @arisunz@lemmy.blahaj.zone avatar

    Some documentation would be nice.

    I’ve been trying to connect qbittorrent to my local i2pd node for the last 30 minutes and for the life of me I cannot get it to work, even though other services work via SAM in the same port. Everything just times out.

    Edit: for anyone else struggling, you need to add your own trackers: old.reddit.com/…/tutorial_how_to_use_i2p_in_qbitt…

    qbittorrent doesn’t seem to be able to fetch those on its own yet

    Strict3443,

    It is experimental indeed. While it “works”, it is no where near the reliability and efficiency of other I2P torrent clients like I2Psnark or BiglyBT, both of which are Java based.

    themurphy, to piracy in qBittorrent 4.6 launches with I2P support - gHacks Tech News

    Anyone has a small and quick guide to how to set this up on let’s say a Rasp Pi?

    Strict3443,

    Guide for Linux: …codeberg.page/…/how-to-use-i2p-on-qbittorrent-no…

    You can install i2pd with sudo apt install i2pd and then point your services towards your i2p router (Ex. 127.0.0.1) and you are good to go.

    themurphy,

    Thanks! And just so I understand this correctly, do I need a separate router for this + my normal router?

    Strict3443,

    You can use one i2pd router for many clients/services, as long as your device can handle it.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #

    Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 18878464 bytes) in /var/www/kbin/kbin/vendor/symfony/http-kernel/Profiler/FileProfilerStorage.php on line 171

    Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 10502144 bytes) in /var/www/kbin/kbin/vendor/symfony/error-handler/Resources/views/logs.html.php on line 28