Sorry mate 🙏Brother, memory safety prevents buffer overflows, not someone dumping your RAM with /proc/mem or a debugger. You're talking with a full-stack developer and I have been doing reverse engineering since I was 14.
God bless.
Sorry mate 🙏Brother, memory safety prevents buffer overflows, not someone dumping your RAM with /proc/mem or a debugger. You're talking with a full-stack developer and I have been doing reverse engineering since I was 14.
That's about performance optimization from rewriting old code, not memory safety magic, they literally rewrote WireGuard-Go to be faster, the language switch was incidental to cleaning up their mess, Rust is known to be very optimized for performance and definitely easier to use compared to C/C++Trust them.
Reference.
NLnet; Wireguard Rust Implementation
nlnet.nl
![]()
Wireguard Rust Implementation | Next Generation Internet
Implementation of WireGuard in a type safe languagengi.eu
I mean all this page says is that they use multiple hops in some sorta mesh like network. They never mention how they provide their IP addresses without any 'central servers'If you are going to hide from govs, it's difficult, you can't fix everything in life.
Even if you use any high secure models there is some sort of limitation.
Read the full white paper to understand the full picture.
![]()
Noise Generating Mixnet I Nym
Learn about the power of our decentralized VPN. dVPNs are the future of privacy on the internet, making our online activity private and securenym.com
I mean all this page says is that they use multiple hops in some sorta mesh like network. They never mention how they provide their IP addresses without any 'central servers'
Is there an easy solution? Apart from using your friend Abdul’s phoneAny VPN is an issue if you connect to it using your own IP.
In the end, it's just another company you are trusting. Not your ISP, but some unknown company somewhere some unknown people vouch for.

The best and easiest solutions are described in this chapter of the Hitchhiker's Guide:Is there an easy solution? Apart from using your friend Abdul’s phone![]()
anonymousplanet.org
Mullvad is usually considered a safe option, and the service should be paid by cash or XMR if you are willing to use them.Anyone has thoughts on Mullvad? Swedish based, www.mullvad.net. I have been using them for about 2 years and no issues so far, but would love to hear your experience.
I don’t understand why they base these companies in places like Sweden, instead of, for example, Nevis or Vanuatu, where privacy would better be safeguarded.Anyone has thoughts on Mullvad? Swedish based, www.mullvad.net. I have been using them for about 2 years and no issues so far, but would love to hear your experience.
It doesnt matter where it is based per se, more about where the team is located. If you have an LLC in Nevis but the company is in the USA they can still kick your doors in or install spyware etc. (it is their own jurisdiction). Sweden has decent laws allowing Mullvad to operate how it does and gives them access to enough techies to provide their service (try running your main VPS servers from such a small island country, that would require massive investments).I don’t understand why they base these companies in places like Sweden, instead of, for example, Nevis or Vanuatu, where privacy would better be safeguarded.
What about Chile and Brazil? They offer plenty of bandwith.I was gonna say the same - internet access at small isolated islands with the bandwidth required for serious industrial applications is probably unachievable at the moment, but I stand to be corrected.
A while ago I was looking for a possible datacenter location for a Swiss company looking to find a suitable place for its datacenter, but the bandwidth they required is simply not available in Paraguay nor Argentina. While Paraguay offers almost unlimited and cheap and reliable hydro energy (Itaipu and Yacyreta dams), the lack of the desired bandwidth is simply not here for a large scale industrial applications.
How do you know that it really does run it though it?VP.net runs your traffic through Intel SGX secure enclaves.
Just read DOJ cases... they have access in many cases (somehow) it doesn't read correctly on how they obtained information etc so there's obviously under some terrorism legislation or something backdoors into a lot of these.Every VPN says "we don't log." They all say "trust us."
VP.net runs your traffic through Intel SGX secure enclaves. They literally cannot see your data since it's cryptographically impossible. You can verify this yourself with their real-time attestation.
The choice is simple: trust what companies say, or use math and hardware that makes spying impossible.
Is this the final solution for VPNs? Would like to know your opinion guys
Check it out: vp.net (I have put my affiliate link, but I don't work with them)
Obviously! You can’t trust any of these companies.Just read DOJ cases... they have access in many cases (somehow) it doesn't read correctly on how they obtained information etc so there's obviously under some terrorism legislation or something backdoors into a lot of these.