

The only way to keep inbound emails that is not encrypted by PGP outside of local authority gateway, that as my knowledge, is to keep the VPS/Server outside of the threat model, in this case outside the 14 eyes. But my outbound emails will encrypted as I use a private VPS server that has proper encryption on to send my outbound emails. But I have the equipment encrypted in my house and the risk of network admin or datacenter technician accessing my files will eliminated in the cost of my communication inbound toward me will not be encrypted in case the email sender never uses the PGP with highest grade encryption.


#OPENVPN GATE HOW TO#
In case of private email server, all my emails will pass through the local authority gateways and as not all the email senders know how to use a highest grade PGP encryption, their communication will be exposed to local authority gateway. Regarding this statement, I’m setting up a DNScrypt server and a private email server, if I use one or two local PC/Server/laptop or use any virtualization technologies locally to run both projects in one PC/Laptop/Server, all communication will pass through my local authority gateway, that can be one of these 14 eyes countries. Any other approaches differ only in the cost of hacking. Only option you do have is to keep own equipment on own territory.
#OPENVPN GATE ISO#
tar/.tar.gz? And if I turn the server off, shall I backup from a mounted live Linux ISO or just exclude some folders that have mounted info and get the backup in the running and encrypted/LUKS server can be low quality option?Ħ- Is there anyway to buy a ISP looking like IP instead of Datacenter IP for the server? Is there anyway to prevent this by any kind of real-time obfuscation technique? Thus I be the only person who can see what data is inside the remote server?ģ- What country has the highest privacy for data/email stored in that country and its outside the 14 eyes and do not exchange the data to 14 eyes for financial/business cases?Ĥ- Is SElinux required for a OpenVPN server security or its just extra process thus we can turn it off? While we blocked all ports including SSH, and only DNSsec+OpenVPN(customized port) is left open?ĥ- Whats the best way to backup this OpenVPN server in a single file?. Also I’m not sure it logs a bit locally or send them to server?ĭo you have any info about any of below matters by any chance please?Ģ- Is there anyway to prevent RAM+SSD information get protected from remote server admin? or Datacenter technician? As the LUKS/LUKS2 encryption key may be accessible to who have physical access to the remote server? And when server is running, the admin/technician can copy RAM+SSD information from remote server. I’m a bit confused then? For client app I mean openvpn-connect. ovpn will log some information despite setting this to ‘verb 0’ even in client side, also this is after setting all you mentioned in server configuration file. Hiya 1) But according to the OpenVPN3 class library, the client profile.
