LOL, sorry for the clutter, folks.
This dude was challenging me in another forum, unwilling to believe that it was commercially feasible to use a VPN to create an anonymous presence in social media. He got so desperate to convince me (TCP/IP kernel dev) that he decided he’d enlist troops of powerusers to help him.
I see that some of you are trying to explain to him the same thing I’ve tried to explain to him 6 times (LOL). Maybe he’ll get it now that others are confirming what I tried to explain.
The issue that prompted the discussion is that Australia’s RWNJ govt is lawsuit-crazy and likes to go after people who say things on social media that they don’t like. So they want to force large social media companies to force Australian users to identify themselves, so that when the RWNJ’s come callin’, the social media company can tell them who to sue.
I tried to explain that the use of VPNs to sign up and use an identity were the way out of this. Most people got it (my original comment got many upvotes.) But this one redditor just doesn’t want to believe it, LOL.
He’s going on and on about local ISPs at the destination node, unable to understand that by the time the local ISP in your destination country sees the traffic, it offers no identification as to the source of the traffic outside of the VPN. And that once the connection is severed, as it’d be by the time a lawsuit-related trace was instigated, a non-logging VPN won’t have a record of who was signed on at the time.
I explained that without CIA-level access and determination (our RWNJ’s don’t have that – our CIA-equivalent is unlikely to be willing to get involved in a matter of an internet user calling a politician a potato, for example… overthrowing a country, yes, namecalling, nah), a VPN is absolutely safe enough for slagging on an RWNJ politician.
Perhaps I’m just too used to dealing with fellow experts to use the right words to explain it to a poweruser type. Sigh. Good luck with him, folks.