VPN's Dirty Little Secret

VPN's Dirty Little Secret

Every day I hear trusted YouTubers give all sorts of reasons why I should be running a VPN to protect myself.?

  • My browsing is not private; my ISP can see what I’m doing
  • I’m not safely connected; a VPN will let me stay safer online
  • A VPN lets me safely use public WiFi?
  • It can detect malware during downloads
  • It blocks trackers and ads
  • I can watch content online and be virtually somewhere else

Pretty compelling stuff! With massive discounts for a limited time, “Hurry! Save $268.32!” and what would seem to be a reasonable price of $3-7 per month on a two year plan, why would anyone not do this?

The dirty secret is that VPNs are used to connect you to a “trusted network,” and once on that trusted network, your network traffic is as vulnerable as it was without the VPN. Do you trust your VPN provider? Do you even know who they are? You’d better, because you’re directly exposing your machine to the VPN’s network, and they are able to see pretty much everything you’re doing online. You may think you’re getting privacy, but that may not be what you are actually getting.?

Similarly, some of the claims they make just aren’t true any longer. Almost all websites these days use TLS/HTTPS which automatically encrypt your data so you can safely do online banking or Amazon purchasing, even over a public WiFi network, without a VPN.

So that leaves using a VPN to pretend to be somewhere else. Whilst that is almost definitely not allowed in the terms of the service of most content providers, it can work. But do you really trust the VPN provider enough to even use this service?

Should You Trust Your VPN Provider?

Many VPN companies seem to have complex corporate structures or links to governments, and so may have other motives to get access to your Internet traffic. It’s tough to tell. Here’s a great video on the subject:

https://www.youtube.com/watch?v=9_b8Z2kAFyY

If you are purchasing a VPN to change your virtual location and you are comfortable with that, then choose the VPN provider wisely. Or, simply become your own VPN provider using a machine you have at home, for example using this guide to use Atsign?’s No Ports tech.?

If you are purchasing a VPN for privacy, then forgo the cost of a VPN—just make sure you see the padlock when browsing, ensure encryption from you to the web server and make sure you have a firewall switched on your machine. But remember that the owner of the web server can see all of your data. It might seem obvious to some, but even though facebook.com uses HTTPS, Facebook can still see all your data and activities on their site in the clear. The same is true with every service on the Internet; the server sees the data in the clear, the email server sees your email, the file server sees all your files. It’s wise to assume that the people who run those servers can see it, too.

If you think people should be able to communicate privately without companies in the middle seeing your data, we are with you on that. Atsign? was started to solve this problem, offering both the underlying technology and a great solution, SSH No Ports, built on top of that technology.

Using our open-source technology, two companies, people, or things can exchange data over the Internet using a server called an atServer. The atServer cannot see the data, because the data is encrypted with keys the atServer never has. Atsign provides true end-to-end encryption, not to a centralized server where your data is in the clear, but instead to the two devices being used by two people to communicate.

Atsign still uses TCP/IP, the Internet for transport of data, and we allow two end points to communicate with each other with full encryption without the need of a VPN.?

For more information about SSH No Ports or Atsign’s underlying technology, visit NoPorts.com? or email us at [email protected].

Mark Bronti

Former Director UBS - Service Management/Network Operations

11 个月

Had not thought about the vpn providers network really..??

要查看或添加评论,请登录

Colin Constable的更多文章

  • LLM does not equal Ai

    LLM does not equal Ai

    LLM does not equal Ai and we are a very long way from AGI. Ignore the hype! But, there is a strong signal amongst the…

    3 条评论
  • What most aligns to your current thinking on Ai?

    What most aligns to your current thinking on Ai?

    A week ago, I posed my LinkedIn connections a question with a choice of four answers. The question was simple, “What…

    4 条评论
  • Fortify Your DMZ Right Now

    Fortify Your DMZ Right Now

    At the edge of your enterprise network, whether on-premises or in the cloud, there will be a DMZ. You may have heard…

    1 条评论
  • Addressing - a problem across time and space

    Addressing - a problem across time and space

    “What is your name and address?” has to be one of the most enduring questions over the last century. But behind the…

    6 条评论
  • Impossible network technology

    Impossible network technology

    The Internet Protocol (IP) is the lingua franca for any modern network, and it also shapes both the risks and the…

    1 条评论
  • Radically Improving MQTT Security easily

    Radically Improving MQTT Security easily

    Message Queuing Telemetry Transport or as it is widely known MQTT, has become a staple IoT messaging solution for many…

    1 条评论
  • Accountability

    Accountability

    Before we officially started Atsign, there was one conversation that shaped so much of what we wanted to create. That…

  • It's a Trap!

    It's a Trap!

    It seems almost impossible, but it is true: We landed people on the moon before we put wheels on luggage. Neil…

    1 条评论
  • 100 Times Faster Internet

    100 Times Faster Internet

    Pradeep Sindhu founded Juniper Networks in 1996 with a game-changing idea: Separate the control plane and the data…

    3 条评论
  • Zero Trust Sockets

    Zero Trust Sockets

    Zero Trust Architecture is the current mantra of security papers and government organizations like NIST in the USA. The…

社区洞察

其他会员也浏览了