Do You Take Your VPN Security Seriously?
#1
[Image: privacy.jpg]In recent years there has been a massive boom in VPN usage, spurred on by security breaches and privacy leaks.

While prospective VPN users pay a lot of attention to the various policies VPN providers have when it comes to logging or leak protection, the user’s own responsibility is often entirely ignored.

When there’s a leak of sorts, such as the common WebRTC, Ipv6, DNS or torrent client leaks, people are quick to point their finger at the VPN provider, even though they could have easily prevented issues themselves.

It’s clear that a good VPN provider should do everything in its power to prevent leaks. At the very minimum, they should inform users about possible risks. Better yet, they should regularly test for vulnerabilities.

Still, VPN users themselves can also take a more proactive approach. The problem is that many people don’t take their own VPN security very seriously.

After signing up at a VPN service, many assume that they are perfectly protected. Aside from checking whether their IP-address has changed, they expend very little effort to make sure that this is the case.

What new VPN users should do instead is a series of VPN leak tests. Not just one, but at least a couple. Also, this should be repeated on all devices and in all browsers that are used, just to make sure.

It would also be smart to redo these tests on a regular basis, as devices and applications change. If there are any problems, fix them, with or without help from the VPN provider.

Aside from testing how leak-safe the setup is, VPN users might want to read the documentation and setup guides their VPN service provides. What is the most secure protocol? Does the software have built-in leak protection? What about a kill-switch?

If you use a custom VPN application offered by the provider it may come in with built-in leak protection, but that’s not always the case.

Also, some providers offer these features but don’t have them enabled by default, as it may lead to various connectivity issues. Others leave it up to the user to secure their browsers and apps. These are all things that should be taken into account.

If there are any leaks, let your VPN provider know. They should fix them if they can, after all.

Similarly, torrent users should not forget to test if their torrent client is setup correctly, and test for leaks there as well. This is easily overlooked by many.

While checking for leaks is crucial, things get even complicated when it comes to anonymity.

Some people are extremely focused on choosing a “zero log” VPN to maintain their privacy, but then use the same VPN to log in to Google, Twitter, Facebook and other services. This links the VPN address to their personal account, creating extensive logs there. And that without mentioning the other privacy-sensitive and tracking data these services collect and store.

While most are not too worried about that, it shows that full privacy or anonymity is hard to accomplish, even if a VPN is secure.

The bottom line is, however, that both VPNs and their users should be vigilant. VPN providers should take responsibility to prevent or warn against possible leaks, but people should remember that a “zero-log” VPN really is worthless if the user hasn’t set it up correctly, or uses it the wrong way.



Do I leak offers a comprehensive and independent VPN leak test, but Google should be able to find dozens more.



Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.
[Image: Torrentfreak?d=yIl2AUoC8zA][Image: Torrentfreak?i=-rEfJg6wD9g:uCHq4CQIFrU:D7DqB2pKExk]
[Image: -rEfJg6wD9g]

Originally Published: Sun, 06 May 2018 20:55:51 +0000
source
Reply
#2
I gotta get into this more :/
Reply
#3
Yeah, if you're using it for a torrent, you need to get into the details. sometimes, there's no kill switch so even if, for a little while, your internet gets disconnected and reconnected, you end up yielding your original IP and that could really cost you. plus you should always look up sites like ip2location and what's my ip to double check if the IP is same as the one your VPN says it is. Leaks are the biggest piece of pain when it comes to torrents and VPNs.
Reply
#4
Going on the internet without a VPN these days is like going and having lots of unprotected *****. One day you gonna end up like Charlie Sheen.
Reply
#5
Thanks. I also need to do more research in this area.
Reply
#6
(May 06, 2018, 18:36 pm)Ernesto Wrote: [Image: privacy.jpg]In recent years there has been a massive boom in VPN usage, spurred on by security breaches and privacy leaks.

While prospective VPN users pay a lot of attention to the various policies VPN providers have when it comes to logging or leak protection, the user’s own responsibility is often entirely ignored.

When there’s a leak of sorts, such as the common WebRTC, Ipv6, DNS or torrent client leaks, people are quick to point their finger at the VPN provider, even though they could have easily prevented issues themselves.

It’s clear that a good VPN provider should do everything in its power to prevent leaks. At the very minimum, they should inform users about possible risks. Better yet, they should regularly test for vulnerabilities.

Still, VPN users themselves can also take a more proactive approach. The problem is that many people don’t take their own VPN security very seriously.

After signing up at a VPN service, many assume that they are perfectly protected. Aside from checking whether their IP-address has changed, they expend very little effort to make sure that this is the case.

What new VPN users should do instead is a series of VPN leak tests. Not just one, but at least a couple. Also, this should be repeated on all devices and in all browsers that are used, just to make sure.

It would also be smart to redo these tests on a regular basis, as devices and applications change. If there are any problems, fix them, with or without help from the VPN provider.

Aside from testing how leak-safe the setup is, VPN users might want to read the documentation and setup guides their VPN service provides. What is the most secure protocol? Does the software have built-in leak protection? What about a kill-switch?

If you use a custom VPN application offered by the provider it may come in with built-in leak protection, but that’s not always the case.

Also, some providers offer these features but don’t have them enabled by default, as it may lead to various connectivity issues. Others leave it up to the user to secure their browsers and apps. These are all things that should be taken into account.

If there are any leaks, let your VPN provider know. They should fix them if they can, after all.

Similarly, torrent users should not forget to test if their torrent client is setup correctly, and test for leaks there as well. This is easily overlooked by many.

While checking for leaks is crucial, things get even complicated when it comes to anonymity.

Some people are extremely focused on choosing a “zero log” VPN to maintain their privacy, but then use the same VPN to log in to Google, Twitter, Facebook and other services. This links the VPN address to their personal account, creating extensive logs there. And that without mentioning the other privacy-sensitive and tracking data these services collect and store.

While most are not too worried about that, it shows that full privacy or anonymity is hard to accomplish, even if a VPN is secure.

The bottom line is, however, that both VPNs and their users should be vigilant. VPN providers should take responsibility to prevent or warn against possible leaks, but people should remember that a “zero-log” VPN really is worthless if the user hasn’t set it up correctly, or uses it the wrong way.



Do I leak offers a comprehensive and independent VPN leak test, but Google should be able to find dozens more.



Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.
[Image: Torrentfreak?d=yIl2AUoC8zA][Image: Torrentfreak?i=-rEfJg6wD9g:uCHq4CQIFrU:D7DqB2pKExk]
[Image: -rEfJg6wD9g]

Originally Published: Sun, 06 May 2018 20:55:51 +0000
source

Damn.  Thank you.  I added a firefox addon that disables webRTC.  Thank you.  The test revealed that my real IP was available, although I am running behind Strong VPN and check it every day.  Another thing to do is to disable the powersave feature in Windows for your wireless adapter.  This will maintain power to your wireless adapter when you are away from your pc, and prevent your VPN from also closing its connection.  Finally, install Technitium MAC Address Changer and change your MAC address.  This is a one-time process and your MAC will remain changed until you personally change it.
Reply
#7
(Sep 02, 2018, 13:33 pm)test_bot Wrote: I added a firefox addon that disables webRTC.

I strongly advise that instead of getting an add-on do it manually.

https://whoer.net/blog/article/how-to-di...-browsers/
Reply
#8
Done. Thanks. The addon managed it correctly, but yes, manually reconfiguring the setting is best. I also tested it with doileak.com, and Firefox passed the test for the webRTC component. Setting mod for various browsers: https://whoer.net/blog/article/how-to-di...-browsers/
Reply
#9
Yes, I take my privacy and security and VPN security very seriously.

Smile
Reply
#10
I am a happy user of NordVPN.
I took me a while to get comfy with it but I use it now all day long.
Next step for me is to take it to the next level.
I will soon place a vpn gateway at the entry point of my home LAN
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Researchers Issue Security Warning Over Android VPN Apps Ernesto 2 44,843 Nov 25, 2019, 01:40 am
Last Post: dlord1968
  IPVanish “No-Logging” VPN Led Homeland Security to Comcast User Ernesto 4 27,656 Jun 08, 2018, 02:47 am
Last Post: AncientRome
  Swedish Police Set to Take Over Pirate Bay Domains Ernesto 5 24,186 Dec 23, 2017, 10:31 am
Last Post: Mr.Masami
  Scammers Take Over Popular KickassTorrents ‘Mirror’ Ernesto 4 27,458 Aug 11, 2016, 03:32 am
Last Post: Picklock



Users browsing this thread: 2 Guest(s)