VPN flaw found
#1
VPN flaw found https://www.theregister.com/2023/08/10/tunnelcrack_vpn/   

i hope Njalla VPN ( ex ipredator) is ok
Reply
#2
(Aug 12, 2023, 14:04 pm)WW3hasstarted Wrote: VPN flaw found https://www.theregister.com/2023/08/10/tunnelcrack_vpn/   

i hope Njalla VPN ( ex ipredator) is ok

Excellent post - Thank you WW3hasstarted
Reply
#3
Just an interesting point to mention, you can actually use a VPN within another VPN and have double the protection.  I know this sounds a bit silly but it will actually work that way...

Hackers try and hack into a double encrypted tunnel if you think you're good enough and let's see how you get on with that Rolleyes  Wink

Notice how the mentions are based around Apple products...  I guess if you use Apple products to do your surfing and downloading you should watch out.  Apple itself is a big spy machine anyway they have quite a large number of servers around the world watching every single product that they've sold.

Just to mention:

I am posting this message right now and I'm using the world's most secure VPN system...

I am currently connected to one location which is also connected to another location that is inside the first.  2 Tunnels that reside on the same connection.  If you can manage to get around the first tunnel then good luck but after that you've also got to get inside the second tunnel.  If you consider each tunnel is using the most advanced encryption system then it means it is double that so I guess the chances of gaining access of that are very slim.  I'm sure there's more chance of Putin going for dinner tonight at the White House in Washington DC.

I would say this entire 'Flaw' thing is very much under control here, you can run 2 VPN's at the same time and nobody is getting into nothing and also be the most paranoid file sharing on planet earth Big Grin
Reply
#4
Glad Mullvad on windows/linux/macos is save Smile
Reply
#5
(Aug 14, 2023, 06:21 am)EddieXTC Wrote: Glad Mullvad on windows/linux/macos is save Smile

Mullvad is an excellent choice !
Reply
#6
(Aug 13, 2023, 10:17 am)RodneyYouPlonker Wrote: Notice how the mentions are based around Apple products...  I guess if you use Apple products to do your surfing and downloading you should watch out.

There never was a day when that wasn't good advice, but even better advice is not to let Apple products anywhere near your surfing and downloading to begin with.  Apple never was all that and I cannot foresee that their shit ever will be.
Reply
#7
Quote:Just an interesting point to mention, you can actually use a VPN within another VPN and have double the protection.  I know this sounds a bit silly but it will actually work that way...

It won't.

In both attacks the OS is tricked into bypassing the VPN. It doesn't matter if you're using VPN in VPN to the power of N. Traffic doesn't go through the first one => it doesn't go through the rest of them.

These vulnerabilities are not related to encryption, but to the secure integration of VPN protocols with OSs.

reference: https://tunnelcrack.mathyvanhoef.com/details.html
Reply
#8
(Aug 14, 2023, 16:46 pm)maskaw Wrote: These vulnerabilities are not related to encryption, but to the secure integration of VPN protocols with OSs.

This wasn't what I was talking about and I wasn't even going to do that anyway as I wasn't prepared to explain the situation or how I go about doing this...

It wasn't what I was doing at all, I was using another technique and one that you are quick to snub. It's okay if that's how you want to be but I wasn't even using a regular OS like you make out, I was actually using a different method one that can only be done by the use of a certain setup. Sorry as I said I'm not prepared to explain myself and nor do I feel I have to either, I guess you could say it's my little secret one that I'm prepared to keep to myself Rolleyes Wink

(Aug 14, 2023, 15:06 pm)CaptButler Wrote:
(Aug 13, 2023, 10:17 am)RodneyYouPlonker Wrote: Notice how the mentions are based around Apple products...  I guess if you use Apple products to do your surfing and downloading you should watch out.

There never was a day when that wasn't good advice, but even better advice is not to let Apple products anywhere near your surfing and downloading to begin with.  Apple never was all that and I cannot foresee that their shit ever will be.

If you know what you're doing with Apple products then it's fine.  If you don't know what you're doing then I guess you have a problem.  It really depends on what knowledge you have and how much you're prepared to keep your privacy.  I'm guessing that you're neither of those and you land somewhere inbetween?  Telemetry is not all that hard to stop but if you've little experience on the subject then I guess it may be true..
Reply
#9
Since both of the attacks that this Register article reports against VPN software require either or both special conditions around your network or tricking you in to first doing something else, it's highly unlikely that users of this forum will encounter it. These would need to be fairly targeted attacks.
Not impossible, of course, and if anyone takes part in large scale, commercial piracy, it's believable that these attacks might be used to produce evidence; but routine users are not likely to ever meet these things.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Israel Owns many VPN providers WW3hasstarted 1 1,210 Sep 14, 2024, 00:09 am
Last Post: silentwolf
  I just found out that Telegram has it's own crpto coin Ladyanne3 1 1,668 Jul 10, 2024, 07:39 am
Last Post: dueda
  I finally found a show to replace my old show Ladyanne3 0 1,215 May 26, 2024, 23:01 pm
Last Post: Ladyanne3
  Another VPN flaw WW3hasstarted 0 1,376 May 07, 2024, 07:31 am
Last Post: WW3hasstarted
  How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak! lustrous 0 6,098 May 06, 2024, 18:26 pm
Last Post: lustrous



Users browsing this thread: 1 Guest(s)