IP Address Banned

georgel

Behind Every Blade of Grass
Charter Member
Benefactor
Supporting Member
Multi-Factor Enabled
Joined
Dec 17, 2016
Messages
12,061
Location
em95gc
Rating - 100%
37   0   0
Tried to log in on my phone while at the airport today and got an IP Address Banned message. Was using phone service. Switched to airport WiFi and got in...

????
 
Restart your phone it should clear issue up, happened to mine a while back. Several others have had similar issues.
 
Bingo! Thanks.
 
I had this the other day, RantingRedneck fixed it :)
 
Since @georgel got his problem fixed, I hope I won't be seen as derailing the thread. But could you guys explain and possibly give sources for someone to obtain the VPN ability and how it works for a techno-toopid old guy? I've read some of it but still probably have little clue.
 
But could you guys explain and possibly give sources for someone to obtain the VPN ability and how it works for a techno-toopid old guy? I've read some of it but still probably have little clue.
Easiest, and probably safest way would be to download the Tor browser bundle. That works by randomizing your internet traffic through three random encrypted links between two nodes (PC's like yours) around the globe before sending the traffic out an exit node to the intended destination.

When you, for example, try to go to google, your PC does a lookup and finds Google is at 172.217.164.142 (just looked it up). Your router knows that address is not on your network so it sends the packets requesting the information out your gateway to your ISP. A similar function happens in a chain routing the packets to the desired destination. Under normal circumstances, you go directly to the destination and they in turn know who you are (your address). A VPN or Tor acts as a middle party that obfuscates your address. In the case of Tor, the address is scrambled multiple times making it neigh on impossible, especially in real time, to identify the source of a connection.

One danger with any VPN or Tor exit node is that they see your unencrypted traffic - unless you're going to an SSL site, so you still want to be cautious about using them for anything sensitive like banking.
 
Last edited:
First of all, you are NOT stupid. It is just an area you have had no reason to familiarize yourself with, and there are gazillions of those for all of us.

That is the really wonderful thing about this little corner of the internet, is so many people who are familiar with so many areas who don't mind sharing.

Anyway. There are really cool technogeeky whiz guys here who will know better than I and may correct me, but here is the essence of it.

Every computer on the internet has an address, much like a postal address, that allows you to be identified and (generally) located. This is called your internet protocol address, or ip address for short. You can "see" what your ip address by going to this site www.whatismyip.com (there are other sites like this, as well).

While it is obvious that terrorists,, drug dealers and other miscreants don't want their location identified (cell phones have a different.... yet same.... tracking mode), it is also true that schmucks like me don't want every one on the web to have my location. For that, we have a "virtual private network" or an ability to hide behind a "network" that logs us on to the internet from a remote location. There are a number of these services out there (some are free, like hidemyass.com), and they have varying levels of security. Some will actually sell your data, so be careful!

After much research, I chose NORD because they are NOT based in the USA, but Panama, and thus out of the jurisdiction of the USDOJ, if they were ever do decide to do something crazy. They also support linux, which I use for my OS (operating system.... it is like windows or Mac, but better :) ) . They are also cheap. I got 3 years of svc for about 100 dollars. They are stupid easy to set up... even with linux, which can be difficult to work with at times.

So, the mods here, if they look to see where I log in from, are going to see me connecting from London, Amsterdam, Hong Kong, Oslo, NYC, Dallas, Chicago etc etc. This also means that I am harder to track for ads, marketing etc.

Now, if Homeland Security wanted me, they have the goods to go "thru" an ordinary vpn and find you (too techie to go into), but if HS wanted me, I would not be stupid enough to go thru a routine vpn. I would do like Snowden did and use what is called "TAILS" as an internet throughway, using a layered router called "onion" (TOR, called for "the onion router".....layers of skin) which, if you take enough precautions, is VERY hard to get to you.

Privacy fanatics believe that since TOR was actually developed by DARPA that the fed has a back door into it and can find you, so there are other ways to be super private, but I dont' have much of an interest in those. The biggest area I might be concerned is electronically moving money outside the USA (via cryptocurrency) if things went very bad here, but I think I will just take my chances slipping over the border with some gold coins and all..... if that ever happened.

Anyway vpn is a way to hide yourself from feds, financial wonks, google (mostly) and general snoopers. There are lots of good cheap VPN providers. Again, I recommend NORD, but ymmv.
 
Ha, thanks guys. I'm gonna have to bring this down to my level. By seeing my "unencrypted traffic", would I assume correctly it means the VPN could see for example where I've been and the content of what I may write here on the forum? I suppose I should ask, "who" would have access to it? But if I go to transfer funds between accounts at the bank, it would be hidden from anyone if the bank is an "SSL" (secure) site. Which I would assume they were.
 
Ha, thanks guys. I'm gonna have to bring this down to my level. By seeing my "unencrypted traffic", would I assume correctly it means the VPN could see for example where I've been and the content of what I may write here on the forum? I suppose I should ask, "who" would have access to it? But if I go to transfer funds between accounts at the bank, it would be hidden from anyone if the bank is an "SSL" (secure) site. Which I would assume they were.
Unencrypted traffic is like addressing a post card. Anyone who "touches" it can read it. Mild encryption is more like putting it in a letter and sealing it. You have to go to trouble to get it, but you can still get it. Encrypted is like you and I having identical copies of say.... the king james bible, or war and peace, and having a code so that 1123 means the 1st letter on the first page of the second word in the third chapter. Even if you "steam the letter" and get the contents, you can't understand the gibberish unless people on both sides of the transmission have the code.
hope that helps
 
Last edited:
Almost all commercial and financial users nowadays have the mild encryption called ssh, or secure shell. It is identified by https as the first block of letters in the web address. I don't think it is awfully secure, but I am more paranoid than most.
 
Last edited:
Yep, that helps, thanks to you both. I'm figuring I shouldn't necessarily look at VPN's as a panacea but simply another level of security attached to whatever I do online. The first level being wise as to where I go, what I say, and what I open from the standpoint of emails, etc. I've the first level fairly well taken care of.
Well except for the dozen lists I'm probably on for coming here every day.

I'll do some research as to providers. Come to think of it, I'm assuming I'll need a VPN for each computer (location). I mean, since all computers have a unique address, I'd need to have one for office and one for home? Or is it as simple as signing up for Netflix from different locations, just use the password and go?
 
A couple of comments:
1) Be careful with free VPNs. Ask yourself, what benefit are they getting? It costs them in terms of real resources to operate so why are they doing so?

1A) Hidemyass in particular, which IS a US based company has been known to turn people and their logs (that they claimed to not have) over to the cops.

2) There was a guy, I forget his real name and online handle. He was one of the more influential members of the online hive called Lulzsec - a break off from Anonymous. See this article: https://www.theregister.co.uk/2012/03/07/lulzsec_takedown_analysis/ The article says they caught him when he logged into IRC one time without Tor. He did a lot of his operation through Tor. I seem to recall that they (the FBI) were able to find him because of a couple of statements he made online in an IRC forum (IRC - Internet Relay Chat, like Freenode). I forget the exact statements, but one involved having been in an odd location and the other involving a brother getting arrested for something - or something similar. This allowed the FBI to narrow the field down to a handful of individuals. At this point, they had to put real eyes on the problem and they engaged in surveillance of the guys house. They found a near one to one correlation between this guy coming and going and the particular online handle coming and going from his house. I think they were also monitoring his network traffic (just about everything radiates) and confirmed that he was also using Tor.

Edit to add: consider plausible deniability. If you use Tor - and allow your PC to act as a relay node (or exit node but you will likely get harassed with take down and other copy right violation notices) that runs 24x7 it is much harder to tell if the illicit traffic was YOU or a guest. It is like operating a guest wifi - they can't prove that you were responsible for whatever transpired across your network.

In any case, if you're interested, Arstechnica.com has A LOT of articles on the soap operate: Google this: "lulzsec sabu site:arstechnica.com"

3) We are starting to get a bit technical when we start talking about SSH and SSL (or TLS). They are related, but different. SSH or "secure shell" is a means to establish a remote command prompt shell, like where Eddie entered his commands to connect to Nord VPN. It is similar to Remote Desktop. When you operate SSH or Remote Desktop the connection is live and continues in real time. In contrast, SSL (Secure Socket Layer) or TLS (Transport Layer Security) are algorithms that are used to secure connections in more static conditions, like loading a web page. It loads and it is done until you refresh it and doing so establishes a new connection. For these functions you have what is called symmetric and asymmetric encryption. I simplifying here a bit - cause this isn't entirely accurate - as both are used in the connection process but generally symmetric encryption is FASTER mathematically and used for real time connections, like SSH or a VPN or even your WPA wireless router at home. There are several different ciphers that go by names like Blowfish, Twofish, AES, TKIP, and others. I don't really know a whole lot about them.

Where I am going with this, is when you establish a secure connection, part of the process involves exchanging the "keys" to encrypt and decrypt the traffic. (see this:https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences). One possibility is to have what is called a "man in the middle". In short, this means that the man in the middle, which could be someone like a Tor exit node, has a copy of the key that allows him to see the unencrypted traffic. Part of the function of a secure connection in addition to the encryption is the authentication - are you connecting to who you think you are? For example, click on the green lock in the address bar for this site and it will show you that the certificate was issued and verified by Amazon. It's the old spy's dilemma of knowing who to trust. If Alice and Bob don't trust each other, but they both trust Charlie, they got to Charlie and ask him to assert that Alice and Bob are who they say they are. This is what the Amazon certificate is doing - presumably YOU TRUST Amazon to act as that third party. The downside is that Amazon used their "keys" to make and or imprint the certificate for this site and could presumably give it to another party, like the Govt, which could then use it to decode your traffic. In fact, if you recall the Stuxnet incident (Iranian Centrifuges) I believe used a stolen (?) certificate from a prominent signing firm to "sign" the malware. See: https://www.schneier.com/blog/archives/2018/02/signed_malware.html

I'll do some research as to providers. Come to think of it, I'm assuming I'll need a VPN for each computer (location). I mean, since all computers have a unique address, I'd need to have one for office and one for home? Or is it as simple as signing up for Netflix from different locations, just use the password and go?
Each computer on your network will have a unique address, but to the outside world you likely only have ONE address. This is due to NAT (and PAT) Network (and Port) Address Translation. In fact, the address on your private network is likely not routable on the interest as they are called RFC 1918 (Request For Comment - an internet standard) Depending upon where you set up your VPN this may be sufficient. For your phones and things, I think Nord (and others) allow up to X - like 4 or so different devices for your account.
 
Last edited:
I'll do some research as to providers. Come to think of it, I'm assuming I'll need a VPN for each computer (location). I mean, since all computers have a unique address, I'd need to have one for office and one for home? Or is it as simple as signing up for Netflix from different locations, just use the password and go?
I use IPVanish. I’m allowed to have 5 devices connected. It has apps for iOS and my Firestick, which makes it super simple to use. It also doesn’t log traffic, which some do.

You can do a search for “VPN Comparison” and see multiple articles/charts that compare popular options.
 
I only use one desktop and two cell phones. Nord allows you to have up to five cell phones, and I don't believe they have a limit on devices. Even if they DID, you can actually set up your router with their app, so that your internet router (which runs all traffic in your home, no matter how many devices... usually anyway), sends all your traffic thru the vpn.

The comments upstream about the free vpns being insecure is VERY good. About all hidemyass and others are good for is kiddies who want to go around restricted sites at school. Nord has some good statements about logging data, what they do with it, and privacy protocols. There are others who are just as good and just as inexpensive. PIA, Tunnel Bear, CyberGhost, IP Vanish (mentioned above), and Proton VPN were all contenders with me.

My advice would be to email them and tell them you are a noobie and you want someone to hold your hand and walk you through it. See who has the best and most eager to help you, and combine that with price and reviews.
 
Lol sorry Noway, I had to giggle at this: "We are starting to get a bit technical"....A BIT? I giggled at that because I'm not sure you recognize just how bright you are. Hell, this is just flat Portuguese to me! But I'm picking it up slowly thanks to you guys. However the Alice, Bob and Charlie analogy definitely made sense over the acronym soup.

You know, since I'm an avowed capitalist, the first thing I thought when "Free" was mentioned was "Nothing is free, there's at least a string somewhere attached". And I am tiring of the disguised strings, whether it be Google, Amazon or Facebook. Dumped Faces years ago and would love being an invisible presence in my visits to anywhere else. Interesting article about Sabu.

Thanks for all the help, I know a bit better where I'm going and how better to get there.
 
@Oldguy

If you happen to decide to go with IPVanish, let me know. I may have a discount available to share.
 
I know exactly how you feel. Especially about topics like ham radio, food prep, homesteading, etc etc. The wealth of info in here is staggering, and I have never met a person who responded to a genuine request for info who did not give gracious and helpful knowledge.

Truly a treasure.
 
@Oldguy (or anybody else)

Was watching a video on YT last night and the guy was sponsored by Nord. Grabbed this screen shot:

CC12561E-5C98-4F3E-B3DF-6C33A520EB8C.png
 
@Oldguy (or anybody else)

Was watching a video on YT last night and the guy was sponsored by Nord. Grabbed this screen shot:

View attachment 134951
I think that is only for existing members who want to extend their membership. I could be wrong, but I looked at the email when it came to me. I was going to send it to the OP.......
 
I think that is only for existing members who want to extend their membership. I could be wrong, but I looked at the email when it came to me. I was going to send it to the OP.......
It was an ad in a video, and that’s how they were trying to get people to sign up. But, it may be there current offer anyway. I went straight to nordvpn.com just now and saw this:

CCD700E7-43A3-402E-9622-70298D4316DE.png
 
It was an ad in a video, and that’s how they were trying to get people to sign up. But, it may be there current offer anyway. I went straight to nordvpn.com just now and saw this:

View attachment 134983
You are probably right. I may have been referring to an even deeper discount that is offered to members only to extend.
The are quite price competitive, any way you look at it. Thanks for posting that. That is what I paid, just over 100 dollars for 3 years.
 
Last edited:
You are probably right. I may have been referring to an even deeper discount that is offered to members only to extend.
The are quite price competitive, any way you look at it. Thanks for posting that. That is what I paid, just over 100 dollars for 3 years.
Definitely looks like a good deal. I think I’m paying ~$3.70/mo for IPVanish, billed every 2 years.

Way better than the standard $10/mo offerings you’ll see.
 
Back
Top Bottom