19 April 2012

How To Make VPNs Even More Secure


From being a niche product used by the few, in the past few years VPN services have hit the big time. These days more and more Internet users see running a privacy enhancing service as a requirement rather than just a luxury. Today we take a look at a few tips and tricks that can enhance the security of any VPN.
While simple to set up and use out of the box, it may comes as a surprise that the security of VPN anonymity services can be improved. Of course, when things run absolutely to plan there’s little to worry about, but there are occasions where there may be a hiccup or where an extra level of security is needed.

Securing your privacy when your VPN fails

Ok, so you’ve purchased your VPN subscription, enabled the service, and you’re enjoying your new found levels of privacy. Then – disaster strikes. While you were away from your machine somehow and for some unknown reason your VPN disconnected and now snoopers have a clear view of your IP address.
Fortunately, there are solutions.
“To protect against the event of VPN failure/disconnection, disable any internet access that does not tunnel through your VPN service provider,” Andrew from PrivateInternetAccesstold TorrentFreak. “This can be achieved using specific Firewall rules (Ubuntu) or bychanging TCP/IP routes.
But of course, not everyone wants to spend time with these manual configurations that could potentially cause problems if they’re not done properly. So, TorrentFreak spoke with the creators of two free pieces of software that do the job more easily.

VPNetMon

“VPNetMon continuously watches the IP addresses of your PC. If the IP address of your VPN is not detected anymore, VPNetMon closes specified programs instantly. The program reacts so quickly that a new connection through your real IP will not be established by these applications,” creator Felix told TorrentFreak.
VPNetMon (Windows) can be downloaded here.

VPNCheck

“VPNCheck helps you to feel safe if your VPN connection breaks, this is done by shutting down your main network connection or programs of your choice and showing a notification box,” Jonathan from Guavi.com told TorrentFreak. “Basically it constantly looks for a change in your VPN network adapter. You can connect to either PPTP or L2TP with VPNCheck.”
VPNCheck (Windows/Linux) can be downloaded here.

Stop DNS Leaks

When using a VPN service one might expect that all of the user’s traffic will go through the privacy network, but on rare occasions a phenomenon known as “DNS leakage” might occur. This means that rather than using the DNS servers provided by the VPN operator, it’s possible that the user’s default DNS servers will be used instead or otherwise become visible.
“A DNS leak may happen whenever a DNS query ‘bypasses’ the routing table and gateway pushed by the OpenVPN server. The trigger on Windows systems may be as simple as a slight delay in the answer from the VPN DNS, or the VPN DNS unable to resolve some name,” explains Paolo from AirVPN.
DNSLeak
A tool for checking for leaks can be found at DNSLeakTest.com and a solution for fixing any problems can be found here. Alternatively, anyone using the pro version of VPNCheck will have this feature built in.

Double up your security for extra sensitive data transfers

What if you don’t have 100% trust in your VPN provider and worry that even they might snoop on your communications? Admittedly it’s a very unusual hypothetical situation, but one with an interesting solution.
“If you don’t trust your VPN provider 100%, use two VPNs,” explains Felix from VPNetMon. “This way you are tunneling your already encrypted connection through another tunnel.”
In Windows this is easily achieved. First, simply set up at least two VPN accounts as normal (if you’d like an extra one for testing purposes you can get a free limited account fromVPNReactor). Then connect to one VPN, and when complete connect to another without disconnecting the first. Like magic, a tunnel through a tunnel.
Its also possible to VPN over TOR, but please please don’t use TOR for file-sharing traffic, it’s not designed for it.
“VPN over TOR gives several security advantages, for a performance price, above all partition of trust,” explains Paolo from AirVPN. “In case of betrayal of trust by one party, the anonymity layer is not compromised in any way.
A VPN over TOR tutorial can be found here, further discussion here.

Fix the PPTP / IPv6 security flaw

As revealed here on TorrentFreak in 2010, people using a PPTP VPN and IPv6 are vulnerable to a nasty security flaw which means that Windows and Ubuntu users could leak their real IP addresses. The following fix comes from Jonathan at VPNCheck.
For Windows Vista and above:
Open cmd prompt and type:
netsh interface teredo set state disabled.
For Ubuntu 10+:
Copy and paste all four lines into a terminal:
echo “#disable ipv6″ | sudo tee -a /etc/sysctl.conf
echo “net.ipv6.conf.all.disable_ipv6 = 1″ | sudo tee -a /etc/sysctl.conf
echo “net.ipv6.conf.default.disable_ipv6 = 1″ | sudo tee -a /etc/sysctl.conf
echo “net.ipv6.conf.lo.disable_ipv6 = 1″ | sudo tee -a /etc/sysctl.conf

Pay for your VPN with untrackable currency.

“When anonymity is a factor, pay with an un-trackable currency,” explains Andrew from PrivateInternetAccess.
“For example, signup for an anonymous e-mail account using Tor and use a Bitcoin Mixer to send Bitcoins to a newly generated address in your local wallet. Alternatively, use theBitcoin-OTC to purchase Bitcoins ‘over the counter’ from a person, rather than an exchange.
“Then, use a patched Bitcoin client, such as coderrr’s anonymity patch to avoid linking the newly generated address to any of your pre-existing Bitcoin addresses.”

Only use VPN providers that take your privacy seriously

We’ve said this before but it’s worth repeating. VPN providers who heavily log are useful if all you’re concerned about is securely communicating with the Internet through an open public WiFi connection, but not beyond that. For a run down of providers who do not log any data which would enable a 3rd party to identify a user, see our previous article here.

Do you have a helpful security tip for VPN users? If so, feel free to add it to the comments below.

Homeless People Became Wireless Hotspots

An unusual marketing stunt has totally backfired,when advertising agency called BBH came up with a splendid idea to turn homeless people at SXSW into wireless access points. The company is sure that it isn’t demeaning.


homeless_hotspots_300x300.jpg

Now the homeless people are equipped with technology that literally turns them into human routers, thus making otherwise charity-givers into Homeless Hotspot users. If you make a small donation, you would be allowed to log on and use the Internet.

Advertising company BBH, which remains behind the scheme, claims that it set out with the best of intentions. The company does realize the concern which has since erupted over social networks. The advertising outfit’s initiative describes itself on its Twitter page as aiding “bring Street Newspapers into the digital age” introducing itself as a modern take on such initiatives as the Big Issue.

The company’s official blog first announced that people will notice “strategically positioned individuals” wearing T-shirts saying “Homeless Hotspot”. Later, an updated entry tried to soothe the furious Twitter backlash.

Despite the fact that it could be argued that turning homeless people into a way for others to check their email is thoroughly dehumanizing and demeaning, the advertising company keeps insisting that such activity becomes the business of the individuals involved, because they can keep all the income they received from providing access to the web. Meanwhile, the company itself has virtually nothing to gain from this except from, probably, exposure. And the expectations are that it will certainly get that.

Although the SXSW trial is regarded as a “beta test”, BBH still hopes that the platform could later be adopted “on a broader scale”.

পার্সোনাল ক্লাউড স্টোরেজ আনছে গুগল

সম্প্রতি জানা গেছে, ব্যবহারকারীদের পার্সোনাল ক্লাউড স্টোরেজ দিতে গুগলের যে সেবা আসার কথা শোনা গেছে, তা আগামী সপ্তাহেই চালু হতে পারে। গুগল ড্রাইভ নামে এ সেবা চালুর খবর জানিয়েছে দি নেক্সট ওয়েব।

সূত্র মতে, প্রাথমিকভাবে পাঁচ গিগাবাইট জায়গা দেয়া হবে, যেখানে ব্যবহারকারীরা বিভিন্ন প্রকার ফাইল ও মিডিয়া আপলোড করে রাখতে পারবেন। এছাড়াও এই সেবার মাধ্যমে কম্পিউটারে একটি আলাদা ফোল্ডার তৈরি করা হবে, যা সবসময় ইন্টারনেটে রাখা ফাইলের সঙ্গে আপডেটেড থাকবে। এই ফোল্ডারে রাখা ফাইলও তাৎক্ষণিকভাবে ক্লাউডে আপলোড হয়ে যাবে।

দি নেক্সট ওয়েব জানিয়েছে, আগামী সপ্তাহে চালু হওয়ার ঘটনা সত্যি হওয়ার সম্ভাবনাই বেশি। কেননা, গত ফেব্রুয়ারিতে এক প্রতিবেদনে দেখা গেছে, সেবাটি ইতোমধ্যেই কিছু কিছু ব্যবহারকারী পরীক্ষা করে দেখছেন। সবকিছু ঠিক থাকলে শিগগিরই চালু হতে পারে গুগল ড্রাইভ।

উল্লেখ্য, ক্লাউড স্টোরেজের ক্ষেত্রে গুগল ড্রাইভ চালু হলে তাদের সবচেয়ে বড় প্রতিদ্বন্দ্বী হবে ড্রপবক্স। সব অপারেটিং সিস্টেমের পাশাপাশি স্মার্টফোন ও ট্যাবলেট ডিভাইসেও ড্রপবক্স ঝামেলা ছাড়া ফাইল সিংক্রোনাইজ করে রাখার সুবিধা দেয়। তবে গুগল ড্রাইভের যে বাড়তি সুবিধা থাকবে তা হলো, আলাদা করে রেজিস্ট্রেশন ছাড়া কেবল জিমেইল অ্যাকাউন্ট ব্যবহার করেই গুগল ড্রাইভের সেবা পাওয়া যাবে।