Track or trace? It depends, it means different things. From basic dictionary definitions, I paraphrase the following meanings:
to trace: follow the completed path backwards from its current point to where it began.
to track: follow the emerging path forwards from your starting point to wherever the thing currently is.
What is contact tracing in the context of epidemic outbreaks? According to WHO definition it is a “monitoring process” consisting of “3 basic steps”: Contact identification, contact listing and contact follow-up. The full definition can be found here.
was playing around with different setups to connect several devices to ProtonVPN being aware of the limit of one or two devices with the Free and Basic ProtonVPN packages. The obvious way is to configure the VPN on your router/gateway. If you have one that allows for OpenVPN to be configured, you can do it there. Mine doesn’t so I had to find another way.
Note, this is not a tutorial, so it does not contain a complete list of steps to be performed. It’s intended to give you ideas how to go about doing this by sharing my experiences. The complete setup is, as they say, left as an exercise to the reader.
I was playing around with different setups to connect several devices to ProtonVPN being aware of the limit of one or two devices with the Free and Basic ProtonVPN packages. The obvious way is to configure the VPN on your router/gateway. If you have one that allows for OpenVPN to be configured, you can do it there. Mine doesn’t so I had to find another way. I also didn’t want to rout all my traffic through the VPN, just basically be able to browse the web.
So I came up with the idea of installing a FreeBSD gateway with two network interfaces, one connected directly to the Internet over which I route the traffic to a ProtonVPN server or servers.
Of course, the machine is running PF firewall software with the appropriate rules, and name resolution happens with unbound which basically just forwards requests to public DNS servers. I am not going to describe either here, because you can use other software to do these task (e.g. use IPFW and hardcode public nameservers in the /etc/resolv.conf file).
I started researching VPN providers some time ago and gave ProtonVPN c closer look since they provide a free base service that isn’t too performant but good enough for testing and many daily activities. With their free offering, which is unlimited in duration, you have the choice of servers in three countries and can connect one device – which may be enough for your whole home network if you configure the VPN connection on your router. The router needs to support OpenVPN and all your traffic will go through a VPN connection, and that may not be what you want.
Also, some sites do block or restrict traffic that come from known VPN gateways, as they do with traffic coming from Tor exit nodes. They identify them as “sites with suspicious traffic” and ask you to do a Captcha every time. Some other sites provide a security warning if you suddenly log on from a different country.
This blog contains random musings and occasional rants on news items that are of interest to me. It’s mostly about politics here, but may also have some occasional topics on IT, Data Science and other topics I find interesting. I found this to be a better way, than writing comments on news sites that may or may not be published and I can’t find anymore after some time.
If you find something interesting, don’t hesitate to leave a comment. Comments will be open for seven days after publication.
If you want to make a contribution to covering the costs of running this blog, you can donate at paypal.me/ofehrmedia
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.