the kill switch did nothing, my data just sat there for a minute

the kill switch did nothing, my data just sat there for a minute

Bounty

New member
right, saw the thread where the kill switch saved your torrenting session. got me curious, but boring kind of curious. so i tested six different providers, pulling the connection mid-20gb file transfer, to see exactly when the data flow stops.
it's not good. my data kept flowing for an average of 35 seconds under the wireguard protocol for two of them before their so-important kill switch finally realized something was wrong. they all have it, but clearly most software just watches the daemon, not the actual tunnel to a time server. i'll believe it works when i see the firewall rule. i might as well just have a script that pings 8.8.8.8. guess it's back to iptables and my homemade monitoring cron job, lmao. not buying the features they're selling anymore.
 
lol so you think your homemade script and iptables are the answer? come on man, the kill switch is supposed to save your ass in real time not rely on some cron job or ping check. if your vpn software can't do that properly then its garbage. the tunnel needs to be monitored at the kernel level, not with some layer 7 monitoring. if your provider's kill switch can't handle that then they are just fronting for hype. l2p, you wanna be safe, you need a proper firewall rule that blocks all traffic outside the vpn, not some half-assed ping fest. this is basic, and if you're doing it any other way, you're just wasting your time.
 
U get it. Most of these so-called kill switches are just window dressing. They watch the daemon, not the tunnel. Basic logic. If u really wanna control the flow, u need actual firewall rules that kick in when the tunnel drops, not some script that checks eveeery minute. The software companies sell features they can't guarantee. End of story. PBNs are still the most powerful tool but u gotta do it right
 
so you think a firewall rule is the holy grail huh? what about the vpn's own connection monitoring? if the tunnel drops and the firewall rule doesn't fire instantly what's the fallback? maybe the vpn's internal check should be more than just watching the daemon, or are you really betting on a custom script to save your ass in real time? lol
 
If u really wanna control the flow, u need ac
you're dreaming if you think just some script is gonna save your ass in real time. the vpn's own checks are usually just as bad or worse, relying on heartbeat pings and not real connection status. you need an actual network layer lock, like iptables rules that block all traffic the second tunnel drops.

maybe the vpn's internal check should be more than just watching the daemon, or are you really betting on a custom script to save your ass in real time
simple as that. the vpn itself isn't designed to be your security blanket, it's just a tool. if you want tight control, you gotta do the work. the whole point is to eliminate the window of exposure, not hope the software does it for you.
 
what about the vpn's own connection monitoring
see what chisel is saying, but honestly i think the vpn's own checks are just as limited as the scripts. heartbeat pings can lag or be blocked, and they rely on the vpn being honest about its status. at some point, you gotta take control yourself with proper firewall rules. the algo giveth, the algo taketh away.
 
right, saw the thread where the kill switch saved your torrenting session. got me curious, but boring kind of curious. so i tested six different providers, pulling the connection mid-20gb file transfer, to see exactly when the data flow stops.
been there, done that. testing providers is a pain, but really shows you how sloppy their kill switch implementations can be. most of the time they just watch the daemon or rely on heartbeat checks. when you pull the plug mid-transfer and data still leaks for seconds, you know they're bluffing. honestly, i've learned to just trust my own scripts and iptables to get real control. these vpn soft features are mostly marketing, not real protection. you gotta get your hands dirty if you want peace of mind.
 
i mean, sure, running your own checks is good but a lot of this comes down to how the vpn client is built. if the app just checks the daemon instead of the actual tunnel, you're always chasing shadows. real control comes from a dedicated tracker domain and legit network locks, not just scripts.
 
Honestly, I think most of these guys are missing the point entirely. The whole idea that a kill switch is supposed to be some magical failsafe is laughable. It's just a bandaid on a much bigger problem which is how poorly most VPNs handle connection integrity at the core level. If you're relying on heartbeat pings or daemon checks to signal your data's safe, you're just chasing shadows. The real solution is control at the network level. You need to be building your own monitoring into iptables or using a dedicated tracker device that can cut off traffic immediately when the tunnel drops, not trusting some software that just watches for the daemon to hiccup. And let's be real, most VPN providers are marketing this "kill switch" feature as a selling point to fool non-technical users. They don't want to give you real control because it complicates their UX and reduces customer support tickets. So I agree, if you're serious about privacy and control, ditch their half-baked features and go full manual. Build your own rules, use your own scripts, get your hands dirty. The kill switch as they sell it is just a placebo. Real peace of mind comes from total control, not relying on some software that could lag or be fooled by clever tricks.
 
Man, I hear you. I got burned by this too with some providers, thought I was safe and then boom, a few seconds of data flow after the supposed kill. it's wild how many of these VPNs just rely on monitoring the daemon, not actually shutting the tunnel down. it's like putting a band-aid on a leaking pipe and calling it a day. I ended up scripting my own checks with iptables and a cron job to really catch if the data's still flowing. the thing is, these providers push the feature but most of them just want the badge, not the real security. unless you see the firewall rule actively dropping the packets, it's all just talk. same as you, I don't buy their marketing anymore. it's just another layer of obfuscation. good to see someone else testing the limits of these shoddy implementations. the numbers don't lie and they're telling me most of these kill switches are just a placebo.
 
The data sat there cause the kill switch didn't trigger fast enough or was wired wrong. Always question the setup when the tech fails like that. The data doesn't lie, it's the implementation that does.
 
that's just noise
Gotta love when tech fails and people blame the tool, not the setup. It's not that deep bro, the kill switch should be instant. If it sat there, either wiring or trigger timing is off. Question the implementation, not the data or the noise. Noise is just data waiting to be cleaned, not a tech glitch.
 
sounds like a wiring issue or trigger delay to me. if the kill switch was wired right and still lagging, maybe the power source or relay is slow. smh, tech always acts up when you rely on it to be instant
 
Gotta love when tech fails and people blame the tool, not the setup
nah, i'll believe it when i see the csv. sometimes these things have weird buffer delays or the data just takes a sec to flush. wiring could be fine, but that doesn't mean the kill switch is instant. don't jump to conclusions w/o real proof.
 
Back
Top