That’s an inherent problem with shared connections.
The thing with sites telling you that your login is incorrect is also sometimes intentional, so people trying to brute-force logins won’t realize they’re getting blocked or just that their attempt was incorrect.
And yes, the only possibility is to try a different server that hasn’t been abused, or run your own.
This is extra maddening with my banking app recently. I even set up split tunneling for it, but it still somehow figures out the VPN. The problem is, it doesn’t let me do ATM withdrawals nor generate one-time virtual cards. Ironically, it still let’s me view full details of my physical card…
So just disconnect from VPN? Oh, not so fast. It remembers that VPN was used at some point, and I’ll have to deactivate the app and then reactivate it without ever connecting to VPN.
Since I have to deactivate and reactivate it daily, immediately when needed, this has led me to decreasing the security by using virtual card reader for 2FA kept on same device as opposed to using physical one and keeping it at home as I used to before this BS.
This is what I mean by the physical 2FA card reader: https://i.imgur.com/QrcEkko.jpg
Yes, that’s the only thing at hand I had to cover the card number :)
I love the entire process. I love that I can send them cash in an envelope with an account number on it and they’ll just top it up lol. I wish every online retailer had to do what they voluntarily do.
You can’t hide behind a VPN and access the entirety of the net. There will always be some site that will block you. It’s just par for the course. Unwinnable battle.
@furzegulo consent-o-matic, made by @midasnouwenshttps://consentomatic.au.dk. the idontcareaboutcookies one doesn’t do what you want as it auto accepts them or blocks the notice, while consent-o-matic sends a legally binding reject signal.
@Weslee consent-o-matic, made by @midasnouwenshttps://consentomatic.au.dk. the one recommended below auto accepts them or blocks the notice, while consent-o-matic sends the legally binding reject signal.
This add-on is built and maintained by workers at Aarhus University in Denmark. We are privacy researchers that got tired of seeing how companies violate the EU’s General Data Protection Regulation (GDPR). Because the organisations that enforce the GDPR do not have enough resources, we built this add-on to help them out.
We need laws that prevent companies from discriminating by how you look. Websites should only be able to deny customers based on how they act. A simple innocent GET from a user with a VPN IP should not be legally permissible reason to deny them.
That thing where they claim the username/password combo is wrong?
That sounds like a really good idea if the site thinks the reason they're a lot of different lock-on attemps from that one ip is because its a hacker with a list of stolen credentials.
Basically just tell them their list is fake and "go away and stop bothering our customers, please."
I’ve had this exact scenario happen with my Amazon account. One the one hand its annoying, but on the other I don’t want them to make it easier for someone in another country to order stuff using my account and credit card.
privacy
Oldest
This magazine is from a federated server and may be incomplete. Browse more on the original instance.