I use ProtonVPN for everything, and I’ve started noticing more and more sites simply blocking me if I try to connect to them through ProtonVPN. As much as it sucks, I’ve more or less become acclimated to having to deal with an increased number of captchas while using a VPN; but I’m pretty angry about being blocked outright. There are at least two broad blocking tactics. First, some sites will say that my network traffic looks suspicious and/or that they simply block traffic from certain IP addresses. But second, and far more maddeningly, some sites tell me that my username and password combo are incorrect when I’m using a VPN. But I know this to be a blatant lie because (1) I use a password manager that auto-fills login forms with credentials that match the domain name, and (2) such sites accept my credentials when I visit them without the VPN connection.

What the hell can we do about this shit? Do I have to run my own VPN to avoid sharing an IP address with other people and thus getting blocked? I really don’t want to do that because I have neither the time nor expertise, and I like that connecting through a VPN provider makes my IP address much less significant. I’m aware that this is connected to the broader conversation about WEI and other methods for determining whether requests are legitimate or not, and I’m sure that businesses of all sizes are reeling from massive increases in bot and AI activity. But solutions that end up punishing legitimate users are not good or valid solutions.

  • alt@lemmy.ml
    link
    fedilink
    arrow-up
    13
    arrow-down
    1
    ·
    1 year ago

    I don’t know if it even works, but have you considered relying on their Stealth protocol? While its absence on Linux (and Windows) means that you might not even be able to make use of it in the first place, I’m still interested to know if it makes any difference.

    • LWD@lemm.ee
      link
      fedilink
      arrow-up
      19
      ·
      1 year ago

      I don’t think stealth does what they want it to do.

      Stealth uses obfuscation to hide your VPN connection from censors. The general idea is to make VPN traffic look like “normal” traffic — or common HTTPS connections.

      Long story short, it helps you reach VPN-friendly or VPN-agnostic websites when you want to get around a state actor or other censor; it doesn’t necessarily help you reach VPN-unfriendly websites (e.g. Netflix).

    • UnsyllabledQuickies@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      6
      ·
      1 year ago

      Oh, this is great! I didn’t know about the Stealth protocol. It’s helped me log into at least one previously stubborn site! Thanks for sharing! 💯

    • u/lukmly013 💾 (lemmy.sdf.org)@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      While its absence on Linux (and Windows) means that you might not even be able to make use of it in the first place…

      Welp, time to run a proxy server on your phone.
      In Termux there’s 4 as far as I am aware. Squid, polipo, privoxy and tinyproxy. I use tinyproxy because it’s pretty simple to set up. Just check the man page.
      Alternatively there’s app called “Android proxy server” in Google Play Store, which is the simplest solution

      If you decide to use basic authentication, keep in mind that it’s not encrypted. It’s transported in base64. So definitely don’t reuse passwords, as if you should do that otherwise anyway. If you really don’t want someone else to connect to it, just leave it on localhost and use SSH tunnel.