I’m going to assume they didn’t implement this because money. Their app runs on everything, from iOS to Android to Windows. Cost savings they likely just flipped camera permissions and didn’t care about small edge cases like these.
With that said, Mullvad is a million times better, cheaper and doesn’t require even an email or account creation to use. They created a system that effectively anonymizes the user before they even subscribe.
Yeah, be careful relying on status messages from trackers, most are actually not that reliable and may misreport. Have had it happen on occasion as well.
I assume they have to cash in some. Or else the SEC comes sniffing around like “you guys have given out 3 million shares over ten years but no one has ever cashed a singled one out, hmmmmm”. So those are likely the rare few. And a few units tracks because they aren’t giving $2m in stock to some entry level tech.
I always liken those practices to the same shit they flash musicians or sports figures during negotiations. Wave a mansion, Lambo, gold, some ladies making all kinds of promised. But in the end, some contractual loop hole says that you’re just “borrowing” it all. Fake money.
You bound torrent client to tun0 You bound VP to tun0
If VPN is on, torrent client connects using VPN. If VPN is off, torrent client cannot connect to VPN or internet.
This is what should happen. It would be more helpful if you told us what you want to do. Do you want the torrent client to keep downloading but no longer behind the VPN? Because most people don’t want that. Which is why they set it up your way. Just in case the VPN accidentally goes down, you dox yourself.
Also a point I haven’t seen made, but a website is not torrent traffic. You could be behind a VPN through your browser but not through your torrent client (Apple’s Private Relay does this, only blanking you from websites). So the fact your torrent client stopped and the web was working seems to point to everything working as it should. You shouldn’t lose any internet unless it’s also bound to tun0.
Also, what did you use to create the tun0 interface to bind your client and VPN to?
Same. Have been doing this for like 5 years now. Oddly enough the spam that comes in is never from any of my aliases. Time well spent 🙃
All kidding aside, it’s great that I can I just abandon them for random accounts that have nothing on me, further reducing the actual front facingness of my real email. If I this feature was there from the start, I’d never have spam!
If there’s a problem and someone with admin access looks at the account and sees 20 unique IPs, some of which were logged in at the same time as others, account sharing.
They are not going to ban you because you’re logged in on some remote machine.
It’s written to make it seem like the system monitors all this in real time but it’s not. Just use the account like any other you’ll be fine.
iMessage definitely has more hooks in than those listed. It’s an integral Apple service that’s hooked into your deeper iCloud account. And because of that, they know a lot more than just a mere “chat” app would get access to. Which likely makes it harder to quantify.
Moreover, Meta and Alphabet also cross reference a lot of data points from all the other sources they have (cookies, IP logs, etc.). Again making actual data points fuzzy or incomplete.