TBH I would just use email over TOR and encrypt communication with PGP. Rotate identities every now and then and you should be fine. Yes it doesn’t have forward secrecy but it removes the effort to find the “right messaging” service and is instead ubiquitous (and you can sign up for anonymous email addresses online too, which makes it even better).
You’re not there for fun lol, you’re there to pirate stuff. Sure, using Signal to pirate would be fine too but your anonymity depends on how long they honor their word of “no logs”. Use a desktop version/ run a VM if you’re on MacOS or something.
Everybody hates me when I say it but Apple users should really reconsider their choices if they are at all interested in privacy. Go get a cheap Android device, hope it has a kernel beyond 5.10 and KernelSU it.
I still don’t see the point.
If religion showed you a method to get to God (praying, doing good deeds etc) and then someone came along who proved that there was a significantly easier way of attaining Nirvana without all the hassle; man would be afraid. “What if we get found out?” But when they see a LARGE and growing community of people ABLE to attain nirvana in exactly the same manner as described (i.e. without the pain) and while fighting the borderline criminal requirements that religion set - many would agree and leave the supposed “set” path and embark towards the easier solution. Some may do it out of greed, some desperation, and many more through sheer curiosity.
Why are people afraid of piracy? Use a damn no-log VPN and attain whatever it is you want without corporate monkeys in your brain. Get a seed box to give back to the community. Give a coffee to the people doing the hard work for the extra seretonin.
The only reason why someone would be arbitrarily afraid is if they don’t have a clue. Such people should be getting into a habit of RTFM; they’re going to need it.
It’s not about the website. Unless they have blocked access to the “connection” endpoint that Mullvad operates, you should still be able to connect to it.
Use TOR bridges. I don’t know how good their firewall is; can they deal with Obsf4/Snowflake too? If they can, I’ll admit that they are taking this seriously.
Use OpenVPN with Mullvad/IVPN if you can, OpenVPN can be disguised as HTTPS traffic. I wouldn’t rely on a free VPN because of the data mining, and it’s only a matter of time before Proton gets banned too
Does the UAE have something similar to China?
Unless they’re doing some serious DPI (no idea how they would do that on Wireguard traffic other than plain metadata mining), the only ways they can stop traffic is by stopping anything to certain IP spaces, or certain types of traffic through certain ports, or a combination of both. If they have truly blocked the Mullvad IP space, then no this will not work, but OP mentioned using a different app to access them, which lets me assume that it was a problem with the client.
Technically speaking, VPN logs tend to include the IP address of clients connecting to them, after which the good VPN providers like Mullvad, IVPN and maybe PIA tend to purge them somewhere in their process. Now, if the VPN is running in a RAM-only node, then these logs probably don’t touch storage, which means there’s not much need to shred information from hard drives for the VPN provider.
With that said, an ISP can technically log your traffic and see that you’re connecting to the IP range associated with a VPN. That and perhaps some more covert side-channel/correlation attacks can, in theory, compromise your identity.
Of course, this is going deep into OPSEC and forensics, and I don’t think the NSA is that interested in the average Billy torrenting “The Office” to go through that many logs, even if the studios sue in court. Hence, technically your privacy is somewhat maintained with the good VPN providers, but you’re definitely not anonymous
In countries where you MUST show your proof of identity to get a number, pray tell me what kind of OPSEC can you employ to not do that?