Jump to content
Not connected, Your IP: 216.73.216.139

Leaderboard


Popular Content

Showing content with the highest reputation on 12/14/19 in all areas

  1. 1 point
    Staff

    Wireguard response from Mullvad

    The simplest method is through WebRTC or any other STUN based technique, which will reveal your private addresses (or more precisely the IP addresses of your interfaces, virtual or real) even with Network Lock enabled (it will NOT reveal your public IP address, of course). Check in ipleak.net for example. Kind regards
  2. 1 point
    Staff

    Wireguard response from Mullvad

    @rndbit In Wireguard you need to map a static IP address in the VPN to a client key permanently as dynamic IP assignment is not available. The private IP address is easily found out by anyone. Once we receive a request by a proper authority about the VPN IP address we can link the address to a unique account. That's a serious privacy concern that does not exist in OpenVPN. Now that we have ChaCha20 cipher even in OpenVPN Data Channel (including our OpenVPN 3 library), there's no pressure to push our customers toward dangerous solutions just for marketing reasons. We can quietly wait for a Wireguard's stable release featuring all the implementations we need (dynamic IP addresses and TCP support). Kind regards
  3. 1 point
    Staff

    Why You Can’t Trust NordVPN

    Hello! The situation is not what you describe, since, according to the article we linked: 1) the CEO of Tesonet, the CEO of ProtonVPN and the CEO of CloudVPN are all the same one person. 2) CloudVPN is not a payment processor. It uses PayPal to collect subscriptions from NordVPN. It's not that you pay to NordVPN via a payment processor called "CloudVPN", you pay to CloudVPN via some payment processor (PayPal for example). In such transactions CloudVPN is not the payment processor, it is the final beneficiary of your payments. To allow such payments via a web site interaction with PayPal, PayPal wants that the beneficiary is the web site owner. Additionally, the developer of NordVPN application in the Google Play Store is CloudVPN. The developer of ProtonVPN application in the Google Play Store is Tesonet. So you know that: - CloudVPN is not a payment processor in the transaction phase, but the beneficiary of the payment - CloudVPN signs the application(s) of NordVPN (therefore it has full access to Google Play Store keys of NordVPN) - Tesonet signs the application(s) of ProtonVPN (therefore it has full access to Google Play Store keys of ProtonVPN) - the CEO of Tesonet, CloudVPN and ProtonVPN is the same person - CloudVPN introduced itself to PayPal as the web server owner of NordVPN This is a matter of trust, and when trust is involved, a lack of transparency should trigger a red alert. This is plainly incorrect even under a purely technical aspect. With Wireshark etc. you can only see that your packets go to or come from the VPN server. You have absolutely no idea of what happens once they are there, outside of your control. As an additional side note, please keep in mind that data mining does not necessarily involves inspection of the traffic content, which is rather trivial and obvious (another trivial consideration: otherwise end-to-end encryption would have meant death of intermediary data mining worldwide ). Kind regards
  4. 1 point
    Staff

    Why You Can’t Trust NordVPN

    Hello! It's unclear what sources for what info (because the OP posted a lot of stuff to be pondered) but the fact that Tesonet operates NordVPN can be easily verified. Start from here then go to the official register sources: https://news.ycombinator.com/item?id=17258203 Tesonet operates NordVPN and has strict business relations with ProtonVPN; Tesonet also signs the ProtonVPN Android application certificate. Tesonet core business includes data mining according to their web site. Kind regards
×
×
  • Create New...