diff --git a/servers/vpn/11.png b/servers/vpn/11.png new file mode 100644 index 0000000..bed7b3e Binary files /dev/null and b/servers/vpn/11.png differ diff --git a/servers/vpn/12.png b/servers/vpn/12.png new file mode 100644 index 0000000..7d66d75 Binary files /dev/null and b/servers/vpn/12.png differ diff --git a/servers/vpn/13.png b/servers/vpn/13.png new file mode 100644 index 0000000..2a4eb08 Binary files /dev/null and b/servers/vpn/13.png differ diff --git a/servers/vpn/14.png b/servers/vpn/14.png new file mode 100644 index 0000000..baa1e5a Binary files /dev/null and b/servers/vpn/14.png differ diff --git a/servers/vpn/index.html b/servers/vpn/index.html index 21fb2bc..8896ea0 100644 --- a/servers/vpn/index.html +++ b/servers/vpn/index.html @@ -140,7 +140,32 @@ curl ifconfig.me

And he can see that his IP got changed accordingly to the location he picked:

The VPN is also protecting against DNS and WebRTC leaks, according to https://mullvad.net/en/check

+

Now that you are using Mullvad as a VPN, you can also use their Mullvad Browser, which is basically a Hardened Firefox based off the Tor Browser:

+

+[ mainpc ] [ /dev/pts/3 ] [~/Nextcloud/blog]
+→ apt search mullvad
+Sorting... Done
+Full Text Search... Done
+mullvad-browser/unknown,now 13.5.1-1 amd64
+  Mullvad Browser
 
+mullvad-vpn/unknown,now 2024.4 amd64 [installed]
+  Mullvad VPN client
+
+[ mainpc ] [ /dev/pts/3 ] [~/Nextcloud/blog]
+→ apt install mullvad-browser -y
+
+[ mainpc ] [ /dev/pts/3 ] [~/Nextcloud/blog]
+→ mullvad-browser
+
+
+

And from there you can browse the web using the same VPN connection:

+ + +

From there, just like on the Tor Browser, you can protect against fingerprinting by setting the security level here:

+ +

If you want to reduce your fingerprinting attack surface as much as possible, you can choose to disable javascript by selecting the "Safest" security level, but it may break some websites functionnality.

+