Welcome to Smokey's Security Forums.
Guests only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

Decrypt latest Nemucod ransomware with Emsisoft’s free decrypter

The Nemucod ransomware family has been around for a while and has gone through several evolutions and changes since then.
Amidst the noise of the NotPetya ransomware outbreak, a new variant of Nemucod dubbed NemucodAES was released.
Our lab promptly went to work and produced a new version of our decrypter to handle NemucodAES and free victim’s files.

Decrypt latest Nemucod ransomware with Emsisoft’s free decrypter

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: VPNs: Your personal tunnel to privacy  (Read 39 times)

0 Members and 1 Guest are viewing this topic.

ScarlettTopic starter

  • Updates Moderator
  • *
  • Offline Offline
  • location: Cymru
  • Posts: 22339
VPNs: Your personal tunnel to privacy
« Reply #1 on: June 15, 2017, 04:15:48 PM »
VPNs: Your personal tunnel to privacy
15 June 2017, 3:07 pm



The idea that the government collects data on everything you do online is no longer stuff of dystopian fiction. When we consider the Vault 7 revelations, Edward Snowden’s ongoing leak of NSA documents and privacy changes that allow Internet Service Providers to sell the data of their users, we can no longer plead ignorance when it comes to our privacy. Everything you do online is available to anyone with the will and means to access it. Whether it’s cyber criminals or your own government.

Yet there are ways to protect your activity online without disconnecting entirely.

A Virtual Private Network, or VPN for short, creates private tunnels for your online activity to pass through. Cost-effective and easy to setup, taking control of your privacy can be as simple as a software download.

Stick around as we will explore why a VPN can be an important tool to protect your privacy and show the easiest way to set it up.

What is a VPN?

To explain this it may be simpler to first explain how a computer transmits data between itself and a website. Usually, traffic between a computer and a website involves the transfer of packets. A little like mail in real life, these packets transfer information from the sender (your computer) to the recipient (the website you are trying to reach) and vice versa.

The problem with these unsecured packets is that they can be intercepted (be it via WiFi, mobile radio signals or your router), exposing your traffic which contains information on which websites you were visiting and what you were doing there. This is known as a man-in-the middle attack and is a big reason why public wifi is so risky.

When you sit down for a coffee and connect to public WiFi, you are vulnerable to having your traffic sniffed. This is where a VPN comes in handy. Connecting to a VPN is like having a loud, private conversation with a friend in that same cafe, but in a language only known to the two of you.

The role of a VPN, therefore, is to mask traffic in such a way that even if it is intercepted, it cannot be read.

Why you need a VPN

Eric Hughes, the original cypherpunk and online privacy advocate perhaps put it best:

“Privacy is necessary for an open society in the electronic age. Privacy is not secrecy.

A private matter is something one doesn’t want the whole world to know, but a secret matter is something one doesn’t want anybody to know. Privacy is the power to selectively reveal oneself to the world.”

An observed life is not a truly free life. To what extent should a government, or other entities for that matter, monitor your actions, browsing habits, or online accounts? Taking control of your privacy is necessary but it is only one reason for using a VPN.

The three main reasons for using a VPN are as follows:

Security on public WiFi

We’ve already briefly touched on public WiFi and the dangers it poses to your security. A VPN masks your traffic and activities adding an extra layer of protection when in airports, cafes, libraries or anywhere else you choose to connect your device to an open access point. Though nothing is 100% impenetrable, while connected to public hotspots your traffic will be much safer with a VPN than without one.

Location anonymity

Some streaming services restrict their content to specific regions, such as Hulu, HBO on demand and many others. A VPN grants your location anonymity, allowing you to access content when outside of your country. This can be particularly useful if you are travelling away from home and want to keep up with your local TV shows and news programs.

However, some television networks have begun blocking access to users if they detect that you are using a VPN.

Surveillance concerns

With the ongoing US privacy controversy centred around the ISPs ability to sell-on your data or share it with government surveillance programs, a VPN is a solid choice to keep sniffers out. This is not to say you have anything to hide. But with a VPN, you alone can choose what is available for companies and government programs to access.  

Let’s also not forget that the above points have significant humanitarian applications.

By masking the geolocation of a user, citizens can access news and other sites from outside of their silenced countries. Where information is controlled and altered by a government, residents in restrictive regimes have the ability to share what is happening in their country to an extent. This is particularly important for journalists and their sources.

VPNs offer many benefits to protecting your privacy or simply letting you watch your favourite shows directly out of the US before they become available in your country. However, like any technology, if someone is willing to put in the time and effort to get in, they can.

How does a VPN work?

A VPN or Virtual Private Network is two or more computers connected via an encrypted connection across the internet. This is a simplified depiction of how a VPN works:



When a user connects to a VPN, a “tunnel” is created. This tunnel acts as a secure line of communication. The information passed through it can’t be read if intercepted because it has been encrypted. The VPN client on your computer and the VPN Server know the key to the encryption so data is only encrypted in transit, but instantly decipherable at the source and destination.

Though it all sounds very complicated, as far as the user is concerned, this process is a simple as logging in. The rest is taken care of for you by the chosen VPN provider.

Choosing your VPN provider

We’ve explained how a man-in-the-middle attack can occur on an unencrypted network and how a VPN service prevents this from happening. What you may have worked out by now is that the use of a VPN simply allows you to elect a trusted man-in-the-middle to look after your data.

Your VPN provider encrypts your traffic for you, meaning they have access to the original traffic, where it came from and all that it contains. For this reason, choosing a VPN provider is a matter of trust.

While trust isn’t easily built, below we have selected a few key criteria to help with your selection:

Paid vs Free VPNs

Please don’t use a free VPN service. Really. If your VPN service is not making money from your subscription fees then it is making it elsewhere, like selling your personal information to a third-party who can spam you senseless. For VPN companies to maintain their servers is very expensive and the old adage holds true: if you’re not paying for it, you’re the product.

We mean it. Don’t use a free VPN service.

True anonymity is a myth

It is growing more and more difficult to be 100% anonymous online. So when you sign up for your VPN, you want to be giving as few identifiable details as possible. If you can’t pay in Bitcoin or with gift cards, you are not signing up for an anonymous service.

Emsisoft Tip: If your chosen VPN provider asks you for more than an email address on sign-up, you are not anonymous. It is not common to seek perfect anonymity when purchasing a service but it is available with the right VPN provider if you are looking for it.

Not all encryption is created equal

Understand which encryption protocols your provider offers. Open VPN is highly configurable and regarded as the most secure VPN protocol. Ideally, your VPN of choice will utilise this encryption method. IKEv2 is also very good but try to avoid using the PPTP protocol, which has known security risks.

VPN logging leaves traces

It is important for you to understand what logs your VPN provider will be keeping. Ideally, your VPN provider will not keep any logs of any kind and be transparent about what data they keep. Additionally, look for a service with a multi-chain hop.

If your traffic is being monitored externally, the hops help to further anonymise your traffic. Each hop represents a different VPN server, usually in a different jurisdiction, so your location and IP are changed multiple times before reaching its final destination. Make sure your provider’s no-log policy includes not tracking of IP addresses and timestamps.

US services aren’t really private

Because of the surveillance laws in the United States, it is best to use VPN services that are based outside of the US and the other 14 eyes countries who monitor each other’s citizens.

Third parties lead to spam

Ensure your VPN has clear policies and easy opt-out options for affiliates. The last thing you want is to set up your VPN service to find it bundled with spam pop-ups or hidden third party access to your data. If your provider has no affiliates, all the better for you.

As we mentioned earlier, the benefits of using a paid service far outweigh those of a free service. You can’t always be sure that a service will keep your data secure, but if your provider is receiving money for their service they are less likely to be selling your email address or other personal information to third parties. Additionally, paid providers typically have faster connections.

Anonymised support

It wouldn’t make much sense to have worked so hard to keep yourself anonymous only to give yourself away when you approach your VPN provider for customer support. Make sure you are able to communicate via an anonymous chat service or encrypt your email communications.

VPN across devices

VPN protection is not just for your computer. Set it up on your mobile phone, tablet or on your home router to automatically protect all devices connected to your network. Make sure to choose a provider that allows enough simultaneous connections to cover your needs.

Downsides to VPN

As with any technology, there will be a small learning curve to get your head around the more technical aspects. Additionally, as your traffic is being encrypted as it passes through the tunnel, your download speeds can suffer slightly.

Complete anonymity is virtually impossible but a VPN gives you extra protection necessary for basic privacy.

Finally, some websites may refuse to work if they detect a VPN. Netflix has clamped down on site visitors masking their geolocations to stream US Netflix outside of the States.

Summary

There are many considerations when we think about our online privacy. Firstly, be actively aware of your country’s surveillance laws, and the privacy policies of your Internet Service Provider. Read the fine print of any VPN service you use and continue to think before you click.

Now that we’ve shared ours, what are your top tips for protecting  your privacy online?

Related Posts:Public Wi-Fi – is it safe?Twitch user accounts possibly compromisedMultinational SIM cards manufacturer Gemalto hacked by NSA…Privacy Alert: Adobe’s Digital Editions eReader is…Hackers can potentially hack WIFI systems on aircrafts to…



Source: Emsisoft Blog

>> To obtain the full Emsisoft article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle