Your browser is obsolete!

The page may not load correctly.

  • add to favourites
    Add to Bookmarks

Is there a safe detour?

Read: 20683 Comments: 2 Rating: 10

Tuesday, April 24, 2018

Let's talk about VPN, how it works, and what pitfalls may await users who want to use it to circumvent various restrictions.

A VPN (virtual private network) is used to establish a secure connection between two computers across shared and public networks. Employees can utilise VPN connections to securely access their corporate networks from home or during a business trip.

A VPN connection can also be used to prevent traffic from being intercepted when the security of an existing network appears to be insufficient. For example, a VPN connection can be used to protect data transmitted over a public Wi-Fi hotspot.

If you are using a VPN, all the traffic from your PC or mobile device is first transmitted to a remote VPN server over an encrypted connection and then relayed to the host you need to access. Thus all the nodes on the network between your device and the VPN server (including your home router and your ISP's infrastructure) can only learn that your device is exchanging encrypted data with a VPN server. The final destination of your data will remain a secret to them.

#drweb

Sounds quite appealing, right? Yes, but only on one condition.

Only a trustworthy VPN server can help maintain the integrity of data and privacy because all the traffic from your device will be transmitted through it. Should the server end up in criminals' hands, they will be able to redirect your queries to bogus sites and harvest and analyse unencrypted data, including your personal correspondence and credentials.

  • Security researchers examined 15 VPN services and discovered that the Chrome extensions facilitating VPN connections for 10 of those services are prone to DNS leaks.

    https://www.anti-malware.ru/news/2018-04-03-1447/25903

  • Paolo Stagno, an Italian security researcher, audited 70 VPN services and found that 16 of them (23%) reveal users' actual IP addresses because of a WebRTC (Web Real Time Communication) loophole. WebRTC technology facilitates video and audio calls in a browser and is supported by many browsers, including Mozilla Firefox, Google Chrome, Google Chrome for Android, Samsung Internet, Opera and Vivaldi.

As many as 18% of VPN applications don't encrypt traffic at all, thus making smart phones vulnerable to man-in-the-middle attacks; 84% of the applications leaked traffic, and 38% incorporated code that was classified as malicious by VirusTotal. Furthermore, four out of the 283 applications for Android studied also installed digital certificates that could be used to intercept and decrypt TSL traffic.

The report was compiled by researchers from Australia's Commonwealth Scientific and Industrial Research Organization, the University of New South Wales, and the University of California at Berkeley.

https://arstechnica.com/information-technology/2017/01/majority-of-android-vpns-cant-be-trusted-to-make-users-more-secure

#anonymity #personal_data #responsibility #privacy #surveillance

The Anti-virus Times recommends

  • If you choose to use a public VPN- server, try to refrain from transmitting sensitive information over the connection. After all, there is no way of telling who could get their hands on your data.
  • As the popularity of VPN services increases, chances are that all sorts of rogue VPN servers will emerge on the Internet. Using those services will possibly put the security of your information at risk.

And a few words about security mishaps.

When it comes to maintaining anonymity on the Internet, even the most experienced hackers can blunder. The hacker going under the alias Guccifer 2.0 is a stellar example. He claimed responsibility for the cyberattack on the Democratic National Committee's servers and the subsequent leak of the stolen data to WikiLeaks in June 2016.

Kyle Ehmke, a security researcher at ThreatConnect, analysed the meta data in Guccifer 2.0's emails in an attempt to determine the true identity of the person behind the alias, but the tracks never led him beyond one server in France. However, Kyle Ehmke was able to determine that the hacker was using the Elite VPN service. One of the service's exit nodes does reside in France, but the company's headquarters are located in Russia.

According to the Daily Beast, Guccifer 2.0 supposedly failed to toggle on his VPN client before signing in and, thus, revealed his real Moscow IP address on an American social networking site. The media outlet doesn't specify what website the hacker visited, but Guccifer 2.0 was known to communicate with other people via Twitter and WordPress (both companies refused to comment).

https://www.securitylab.ru/news/492261.php

[Twitter]

Tell us what you think

To leave a comment, you need to log in under your Doctor Web site account. If you don't have an account yet, you can create one.

Comments