> Yes could be, he has a "social engineering" approach to people. He places > people and > himself on the same level of machines. Then he searches vulnerability on > persons. > He makes extensive use of corruption to take advantage on his personal war. > From this > point of view also a vpn provider could be very vulnerable because as many > people know > vpn providers are not big rich companies.
You would use a VPN to escape the claws of your own government, but not the claws of some corrupt individual in your country. Therefore I see no reason, why you would use a VPN, and its required software to use it would just increase your attack surface. > About authorities it would be my next step when I'll find proofs of what I'm > saying. > Because as you saw the first thing they think it will be "this guy is > paranoid". That's the great benefit of virtual machines with snap shoting: unless the "evil hackers" can not only control your running system, but can also break through the boundaries set by your virtual machine, you have reasonable ways to collect evidence. Just create snaps whenever your system feels strange, and you can inspect these snapshots at a later, more convenient moment. You can also perform comparisons between snap shots. > Yes I thought to try to use vm on linux, but you know the linux kernel is > hole with some > code around. Yes, they say all kinds of nasty stuff about linux, but overall it works well, and the vast majority of public facing servers run linux. Your best bet will probably be some kind of variety of systems: linux, windows, freebsd, maybe throw some openbsd into the pool. if "evil hackers" have to check your system first, and probably throw some non-working exploits at it before breaking through, then you have a good chance of catching them in the act. make your setup as unpredictable as you can, and "they" will leave undeniable traces. Once you have these traces, you can probably learn more about the hacker's methods and develop a strategy to get rid of them for good. PS: It would probably attract more helpful talent here, if people had reason to assume, that your efforts serve some common goal and are not some private quest for free security consulting. Care to share, why you think your computers are under attack?