• Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    2 days ago

    You are welcome to scan my public IP. There are bots scanning it every few seconds. If there was a vulnerability it would be exploited in the matter of a few minutes.

    Also, you have no way of knowing who is behind a website. That’s why web browsers have strong security mechanisms. It is by necessity.

    VPNs do very little. However, VPN companies want to keep up the fear mongering to make money.

    • Cypher@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      2 days ago

      If there was a vulnerability it would be exploited in the matter of a few minutes.

      Around 10 minutes for an unpatched XP box with no firewall.

      Much longer for obscure vulnerabilities in routers or more difficult to exploit vulns in hosted software.

      It is also possible for vulnerabilities in peertube itself to exist, which will be an issue regardless of VPN use.

          • Possibly linux@lemmy.zip
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 days ago

            Why wouldn’t you port block on your Firewall? For that matter, why do you have any ports exposed to begin with.

            • Cypher@lemmy.world
              link
              fedilink
              arrow-up
              2
              ·
              2 days ago

              Like I said, people doing self hosting, they often open up ports for those services and management ports.

              Some routers have backdoors built in, such as the Fortinet NGFW backdoor, that can also be exploited.

              I work in this industry and believe me the risk is real, no vpns aren’t a silver bullet, but there are a few good providers out there that can help mitigate some risks of using P2P for more than piracy.