I want to try bitmagnet on the dev server at work (yes, we have permission to use it for personal reasons as long it's legal) but for obvious reasons it must be tunneled through a VPN.
Bitmagnet it's a local search engine that discovers content via DHT. It just asks peers for content, then when you come back the following month it should have found many interesting stuff
Problem is that from a network point of view it looks I want to download every single torrent ever made so I wouldn't want to have my workplace ip address associated with that.
Because the network traffic is minimal and for this content I don't care if the provider does data mining, I would like to use a free VPN with gluetun.
But I can't find a free one that works. From the officially supported only windscribe and proton have a free offer, but windscribe free doesn't have OpenVPN or wireguard, while proton VPN free blocks me immediately as soon as the program talks with other peers, even if I don't actually download anything.
So back to the question, which free VPNs are working with gluetun, someone has experience with that?
Don't do this.
It is a terrible idea.
Free services have negative interest in protecting user's privacy, they would mine the shit out of that data.
Since you are doing this from a company network and split tunneling is not 100% secure, this means that your company computer will send internal communications through the VPN, where it will be mined the shit out of.
Since you are talking about torrenting, even if you are just consuming small ammounts of data, don't be surprised if the VPN provider eill either block you immediately, or hand over suspicious logs to the police/media companies.
You claim to have permission to do this, I am pressing X to doubt, if you had proper permission to do this you would not need to use a free VPN, the company would either have the technical and legal infrastructure to deal with this, or they would provide you with a good paid VPN like Mullvad.
This sounds extremely sketchy to me, and unless I have a written and signed order to do this in this manner I would refuse to do this work, and even then I would want a written and signed order for the specific time I had to do it.
This keeps being said and I don't understand why people keep saying it. Split tunneling should be exactly as secure as your route table makes it, shouldn't it?
Sure, if you can guarantee that the specific program uses the tunnel for the specific connections required.
It is not uncommon for programs to to either not use the tunnel correctly or not use it at all.
While its nice when a program let's you pick the egress interface for its network traffic, split tunneling is still on the host os for handling its route table and making sure that's set up correctly. Like, were people setting up split tunnel networks where they were treating the vpn interface as a proxy, pointing the software at it, and just hoping for the best?