<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VPN Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/vpn/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/vpn/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 03 Dec 2020 19:25:45 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>VPN Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/tag/vpn/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 057 Dodgy Survey App</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-057-dodgy-survey-app/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 04 Dec 2020 02:15:41 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dodgy Survey App]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Microphone]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Concern]]></category>
		<category><![CDATA[Root Certificate]]></category>
		<category><![CDATA[Survey]]></category>
		<category><![CDATA[Survey App]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2402</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 57. This week we&#8217;re going to talk about a dodgy survey app. Where did this Survey App come from? I came across a photo on Twitter last week that showed a letter that was sent to a person in the UK from a company called Ipsos MORI. They are a survey,&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-057-dodgy-survey-app/">#WeekendWisdom 057 Dodgy Survey App</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 57. This week we&#8217;re going to talk about a dodgy survey app.<span id="more-2402"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2402-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/12/WeekendWisdom-057-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/12/WeekendWisdom-057-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/12/WeekendWisdom-057-lo.mp4</a></video></div>
<h3>Where did this Survey App come from?</h3>
<p>I came across a photo on Twitter last week that showed a letter that was sent to a person in the UK from a company called Ipsos MORI. They are a survey, research company over in the UK. The letter asked the individual to install an app on their smartphone or tablet and to participate in surveys for which they were going to get some payments. Now there is some privacy concern with this app.</p>
<h3>The microphone? Why?</h3>
<p>The first one is that it wants permission to access to microphone. To be able to record audio and they say they will wake up randomly and listen to what&#8217;s on in the background, to see if a particular television programme or radio programme is on. But it could record something else. &lt;wink, wink, wink&gt; You know what I mean. So there is that concern.</p>
<h3>A root certificate? What&#8217;s that?</h3>
<p>They also ask you to install a root certificate and most people don&#8217;t know what a root certificate is. Basically this will enable the survey company to be able to watch everything you&#8217;re doing on the internet. Every site you go to. Everything you log into. They will be able to capture your passwords, your user IDs, some things like that. They say they won&#8217;t use them, but they can. That is a real, significant risk. People will just click OK because the instructions tell them it&#8217;s ok to do so. Don&#8217;t install root certificates people, please.</p>
<h3>Anything else wrong?</h3>
<p>There&#8217;s also some VPN that&#8217;s installed. I&#8217;m not sure how bad that is that hasn&#8217;t been researched fully yet. But that&#8217;s still a little bit iffy.</p>
<p>So look, if you&#8217;re being asked to install an app and you are being paid money for it, check out the privacy implications. Talk to a professional about it to see are you being violated in anyway.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-057-dodgy-survey-app/">#WeekendWisdom 057 Dodgy Survey App</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/12/WeekendWisdom-057-lo.mp4" length="32242784" type="video/mp4" />

			</item>
		<item>
		<title>VPN Logs. Should you be concerned?</title>
		<link>https://www.l2cybersecurity.com/vpn-logs-should-you-be-concerned/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Jul 2018 15:59:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1302</guid>

					<description><![CDATA[<p>I&#8217;ve been meaning to write this up since March when I talked about a VPN Leak situation. Are you aware that some VPN providers maintain logs about your usage of their service? Some VPN logs are more detailed than others. In some cases the VPN providers state on their website that they don&#8217;t keep logs&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vpn-logs-should-you-be-concerned/">VPN Logs. Should you be concerned?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1303" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/VPN-logs-150x150.jpg" alt="VPN logs" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/VPN-logs-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/VPN-logs.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />I&#8217;ve been meaning to write this up since March when I talked about a <a href="https://www.l2cybersecurity.com/does-your-vpn-leak-data/">VPN Leak</a> situation. Are you aware that some VPN providers maintain logs about your usage of their service? <span id="more-1302"></span>Some VPN logs are more detailed than others. In some cases the VPN providers state on their website that they don&#8217;t keep logs and yet they still do. This could potentially go against the requirements of the #GDPR as they must state clearly what personal data they process on you. So saying they don&#8217;t and then actually doing it, is a breach of the law.</p>
<h3>We don&#8217;t do VPN logs &#8230; often</h3>
<p><a href="https://www.bolehvpn.net/">BolehVPN</a> clearly states on their main site that they have a No logs policy. There for all the world to see in green and white:</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-1307" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_1.jpg" alt="" width="640" height="146" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_1.jpg 640w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_1-300x68.jpg 300w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p>And yet, if you mosey on over to their privacy policy, that changes things:</p>
<p><img decoding="async" class="aligncenter size-full wp-image-1308" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_2.jpg" alt="" width="793" height="271" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_2.jpg 793w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_2-300x103.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/BolehVPN_2-768x262.jpg 768w" sizes="(max-width: 793px) 100vw, 793px" /></p>
<p>This might seem a reasonable process to allow. After all nobody likes people who are abusing a service. However they are saying they turn on VPN logs to capture enough information to be able to identify a user and find out what they are up to that is causing the alleged abuse. Now bear with me on this one. It&#8217;s not as far fetched as you might think.</p>
<ul>
<li>What if the &#8220;abusive user&#8221; was actually law enforcement in a totalitarian regime?</li>
<li>What if they had compromised BolehVPN&#8217;s servers and were trying to locate &#8220;rebel activists&#8221; within their borders?</li>
<li>What if they start overloading the servers, prompting BolehVPN to initiate logging to identify the offenders?</li>
<li>If the &#8220;rebel activists&#8221; were connected at that time, then law enforcement should be able to gain access to those logs and be able to identify them.</li>
</ul>
<p>I&#8217;ll now toss in the GDPR aspect here. That privacy policy doesn&#8217;t specify what personal data is being logged, which would actually be a requirement for any EU resident using the BolehVPN service. So they would be in breach of the regulation here.</p>
<h3>Careful wording</h3>
<p>Some providers use very carefully chosen language. For example <a href="https://www.astrill.com/">Astrill VPN</a> says clearly on their main website page &#8220;No Logs kept&#8221; and then in their privacy policy they indicate that they have logging in place, but only while the connection is active. So the logs are not <span style="text-decoration: underline;"><strong>kept</strong></span>, but they still exist for the duration of the connection.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1304" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/AstrillVPN.jpg" alt="" width="754" height="126" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/AstrillVPN.jpg 754w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/AstrillVPN-300x50.jpg 300w" sizes="auto, (max-width: 754px) 100vw, 754px" /></p>
<p>At least Astrill specify what data they have in the &#8220;temporary&#8221; log.</p>
<h3>Excessive VPN Logs</h3>
<p>Other providers are quite open about the information they log on you, but in some cases the amount of information they log is actually quite concerning. <a href="https://www.hidemyass.com">HideMyAss VPN</a> keeps a record of the following for at least 30 days (though it could be longer):</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1306" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/HMA_VPN.jpg" alt="" width="716" height="264" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/HMA_VPN.jpg 716w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/HMA_VPN-300x111.jpg 300w" sizes="auto, (max-width: 716px) 100vw, 716px" /></p>
<p>For a company that sells a product that supposedly improves your online privacy, that is quite a lot of information about you that they are holding onto. The other concern here is that HideMyAss is a UK based company. The United Kingdom has in recent years passed what is known as the <a href="https://www.computerworlduk.com/security/draft-investigatory-powers-bill-what-you-need-know-3629116/">Snoopers Charter</a>. This gave government ministers powers to access peoples personal data without there being a suspicion of law breaking.  Also the UK is a member of the <a href="https://ukdefencejournal.org.uk/the-five-eyes-the-intelligence-alliance-of-the-anglosphere/">Five Eyes Countries</a>. These countries regularly ask for and are provided with intelligence about individuals, ostensibly for national security purposes.</p>
<p>With the amount of data logged by HideMyAss and easy access to it by the powers that be, you won&#8217;t be browsing the internet as privately as you may think. They have, in the past, <a href="https://www.theregister.co.uk/2011/09/26/hidemyass_lulzsec_controversy/">handed over information</a> to the US FBI about a hacker.</p>
<h3>I&#8217;ve broken no laws. Why should I be concerned?</h3>
<p>You may have broken no laws <span style="text-decoration: underline;"><strong>now</strong></span>. But what if the government introduced a law that you didn&#8217;t like and you could bypass this law by use of a VPN. You might value the fact that a good private VPN doesn&#8217;t give law enforcement enough data to convict you.</p>
<p>While this might be an unlikely scenario (though with the way things are going in the US right now, who knows), it probably isn&#8217;t something that should directly concern you. Flip this around though. There are countless people (e.g. journalists, human rights advocates), living in countries that are effectively police states, who are trying to get the truth out about what is happening in those countries and they absolutely need every bit of anonymity that they can get.</p>
<p>VPNs are absolutely essential to these type of people, but also for people who value their online privacy and security. I typically will never connect to a public Wi-Fi internet connection (e.g. in a coffee shop) as I simply do not trust how they have been set-up. I also cannot be certain that the access point to which I would connect is actually the one being provided, as an evil doer can have their Laptop &#8220;impersonate&#8221; (spoof) the coffee shop&#8217;s Wi-Fi and then record all of the data that is sent and received from my laptop.</p>
<p>Instead, I will typically use the hot-spot facility on my phone to connect to the internet. However if my signal is terrible and I really need to get on the internet, I will connect to the Wi-Fi, but then immediately establish a VPN connection, thus encrypting my connection and making all of the data meaningless to any bad guy intercepting my traffic.</p>
<p>The bottom line here is, if you value privacy, then get yourself a VPN that does not log any data about you or your activity on their service. You&#8217;ll have to read the privacy policies closely though to ensure that this is the case and that VPN logs are not recorded.</p>
<p>Let&#8217;s be careful out there.</p>
<p>The post <a href="https://www.l2cybersecurity.com/vpn-logs-should-you-be-concerned/">VPN Logs. Should you be concerned?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Does Your VPN Leak Data?</title>
		<link>https://www.l2cybersecurity.com/does-your-vpn-leak-data/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 28 Mar 2018 14:45:59 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1296</guid>

					<description><![CDATA[<p>It&#8217;s probably not a question most people would ask when they purchase a Virtual Private Network (VPN), but maybe you should ask &#8220;Does this VPN leak data?&#8221; It&#8217;s been revealed that several VPN providers are putting your privacy at risk by leaking some data that should be kept secret. VPNs are supposed to be all about&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/does-your-vpn-leak-data/">Does Your VPN Leak Data?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1297" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Leaking-VPN-150x150.jpeg" alt="VPN leak" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Leaking-VPN-150x150.jpeg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Leaking-VPN.jpeg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />It&#8217;s probably not a question most people would ask when they purchase a Virtual Private Network (VPN), but maybe you should ask &#8220;Does this VPN leak data?&#8221; It&#8217;s been revealed that several VPN providers are putting your privacy at risk by <a href="https://voidsec.com/vpn-leak/">leaking some data</a> that should be kept secret. <span id="more-1296"></span>VPNs are supposed to be all about privacy, so this question shouldn&#8217;t have to be asked as the provider should not be leaking anything.</p>
<p>&nbsp;</p>
<h3>What&#8217;s this VPN thing anyway?</h3>
<p>A VPN is (usually) a piece of software that is installed on your computer or mobile device which establishes a secure connection between that device and some other point on the internet. That could be your corporate network or a VPN provider&#8217;s network. The connection is fully encrypted, so all the data flowing between your device and the other end of the connection will be meaningless scrambled data. It will be useless to anybody that intercepts this data.</p>
<p>What is also very important is that the VPN hides the users identity/location by making your device appear to be located elsewhere on the internet, rather than where your internet provider shows you as being. It does this by assigning your connection a different address on the internet, also known as the Internet Protocol (IP) Address.</p>
<h3>So what data does some provider&#8217;s VPN leak?</h3>
<p>The <a href="http://ip.voidsec.com/">simple tool</a> provided by the security researcher Paolo Stagno can show your original IP address as well as your VPN provided IP address. Therefore a website can tell where you actually are on the internet rather than where your VPN provider is trying to show you as being from. So here is an example of where you have a VPN leak:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1298" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/vpn-leak.png" alt="" width="601" height="363" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/vpn-leak.png 601w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/vpn-leak-300x181.png 300w" sizes="auto, (max-width: 601px) 100vw, 601px" /></p>
<p>As you can see, in the lower half (Web RTC), your Internet Service Provider (ISP) provided IP address is shown, along with your actual internal address of your local home or office network.</p>
<p>Compare that now to a VPN connection where they are not allowing the data to be leaked:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1299" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-vpn-leak.jpg" alt="" width="609" height="367" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-vpn-leak.jpg 609w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-vpn-leak-300x181.jpg 300w" sizes="auto, (max-width: 609px) 100vw, 609px" /></p>
<p>Here we see only the VPN provider&#8217;s IP address and their internal network address. So somebody using this VPN would not be at risk from being identified and located on the internet. This is important to maintain privacy, as that is one of the main reasons for wanting to use a VPN in the first place.</p>
<p>If you would like to have a chat about some of the<a href="https://www.l2cybersecurity.com/#ourservices"> security services</a> we can provide, then please either send an e-mail to <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a> or call us on <span style="text-decoration: underline;"><strong>087-436-2675</strong></span>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/does-your-vpn-leak-data/">Does Your VPN Leak Data?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
