

Great input and you’re absolutely correct. Very important to safeguard backups.
2023 Reddit Refugee
On Decentralization:
“We no longer have choice. We no longer have voice. And what is left when you have no choice and no voice? Exit.” - Andreas Antonopoulos
Great input and you’re absolutely correct. Very important to safeguard backups.
Use of a VPN depends on your privacy threat model.
Using VPN at all times while using the internet like one normally does is beneficial only to the extent that you encrypt your traffic and prevent your ISP from spying on you… mostly. But if you’re logging into known accounts associated with you, then it’s a moot point. Your traffic is encrypted, but your use of services leaves an easy to follow cookie trail of where you’ve been.
If your privacy threat model is much more serious, then you wouldn’t login to any known accounts while on your VPN. You wouldn’t use services that can be pinpointed to you.
Hence, use a VPN to your discretion. If you generally don’t want your ISP spying on you, keeping it on is always best practice. If you have more things to hide, you’d want to use Tor while on VPN and of course don’t use any services that could be linked to you.
Nothing much you can do except make it harder for nefarious parties to get your information. If you’re in the U.S. most of your information is public. With two pieces of info about you, you’re one Google search away from your name, physical address, schools you went to, where you’re employed, etc. You can’t stop this, so just make it harder when your data does get leaked.
Here are my best practices:
Archived article: https://archive.is/rDbgD
Do it. It’s very straightforward.
Whenever you need to switch providers such as if Tuta decides to support fascism like Proton’s CEO, you can easily switch to a new provider. Then add your domain to the provider, update your DNS records to point to your new provider, click Save. Done. And you won’t have to change your email addresses ever again.
HTTPS with no VPN:
You trust the web site to encrypt your data if and only if the web site has properly implemented encryption along with encrypted DNS traffic. Sometimes you make a connection to HTTP before you’re redirected to HTTPS. Your ISP can see what web sites you visit, but the ISP can’t see what you’re doing because the traffic is encrypted so long as encryption is implemented correctly. ISP knows you went to https://www.website.com/.
Conclusion: Your ISP knows exactly what web sites you visit, but can’t see what you’re doing on the web site (if encryption is properly configured by the web site provider).
HTTP or HTTPS with trusted VPN (e.g., Mullvad):
You trust the VPN provider. Your connections are encrypted entirely. Your ISP can’t see what web sites you’re visiting nor can they interpret your traffic.
Conclusion: Your ISP is completely blind to what you’re doing and where you’re going.
ExpressVPN:
PureVPN:
Here are more sources I won’t quote, but you can read: