Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

The New Coffee Room

  1. TNCR
  2. General Discussion
  3. Beware these VPNs

Beware these VPNs

Scheduled Pinned Locked Moved General Discussion
30 Posts 11 Posters 369 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jon-nycJ Offline
    jon-nycJ Offline
    jon-nyc
    wrote on last edited by jon-nyc
    #21

    Ax, do you trust the WiFi in, say, Hiltons? From what I can tell they have a contract with att to provide it everywhere.

    Or Starbucks?

    I regularly trust these and others but I don’t go to my bank or vanguard or whatever. I would only do that over the cell network

    Only non-witches get due process.

    • Cotton Mather, Salem Massachusetts, 1692
    George KG 1 Reply Last reply
    • jon-nycJ jon-nyc

      Ax, do you trust the WiFi in, say, Hiltons? From what I can tell they have a contract with att to provide it everywhere.

      Or Starbucks?

      I regularly trust these and others but I don’t go to my bank or vanguard or whatever. I would only do that over the cell network

      George KG Offline
      George KG Offline
      George K
      wrote on last edited by
      #22

      @jon-nyc I would never do anything even remotely private over a public network. That's what VPS, or cellular data, are for.

      "Now look here, you Baltic gas passer... " - Mik, 6/14/08

      The saying, "Lite is just one damn thing after another," is a gross understatement. The damn things overlap.

      1 Reply Last reply
      • jon-nycJ Offline
        jon-nycJ Offline
        jon-nyc
        wrote on last edited by
        #23

        Yeah, but typically I’m reading online news or twitter or posting here. I’ve thought about the WiFi issue before and then fugired, do I really care who sees this?

        Only non-witches get due process.

        • Cotton Mather, Salem Massachusetts, 1692
        1 Reply Last reply
        • markM Offline
          markM Offline
          mark
          wrote on last edited by
          #24

          I use Nord VPN on my pc, mac and phone.

          1 Reply Last reply
          • AxtremusA Offline
            AxtremusA Offline
            Axtremus
            wrote on last edited by
            #25

            How I see various public or semi-public Wi-Fi hotspots in North America:

            • Marriott, Hilton - won't login to financial accounts or do any software update over their Wi-Fi, but otherwise OK with using them for most things. Stayed in enough of them to be able to tell whether a particular property's Wi-Fi/Internet access system has been brought up to the usual Marriott or Hilton standard. Every once in a while I got into a property newly acquired by the chain and the Wi-Fi doesn't look or feel right (e.g., the way the network is named, the way the login process is handled), then I just treat it like I treat Wi-Fi provided by "other hotels".

            • Transportation hubs (airports, train stations, etc.) - the challenge is, when you see a Wi-Fi network name like "ATL Free Wi-Fi", how do you know that it's really operated by the "ATL" airport? If there are obvious, publicly posted signage or public announcements that collaborate that "ATL Free Wi-Fi" is indeed sanctioned by the airport, then I treat it like I treat the Marriott or Hilton Wi-Fi. Otherwise I avoid them.

            • Regulated utilities (Comcast's XfinityWiFi, the cable consortium's CableWiFi, AT&T Wi-Fi, T-Mobile Wi-Fi, etc.) - If I can access them using the HotSpot 2.0 standard, then I treat them like I treat the Marriott or Hilton Wi-Fi. Otherwise I avoid them (because I cannot verify whether a network that's named "AT&T Wi-Fi" is indeed operated by AT&T).

            • Other hotels, restaurants - won't login to any site that requires that I login, won't do any software update over them, but I otherwise don't mind using them, especially with sites that are accessed using HTTPS/TLS. This, too, is predicated on me being able to verify that the Wi-Fi network is sanctioned by the proprietor (e.g., there are posted signage or the front desk tells me that "XYZ Wi-Fi" is indeed an amenity provided by "XYZ hotel" or "XYZ restaurant"). If I cannot verify that, then I avoid the using the network.

            1 Reply Last reply
            • KlausK Offline
              KlausK Offline
              Klaus
              wrote on last edited by Klaus
              #26

              I think some of you guys are a little hysterical.

              I'm happy to use any WiFi, regardless of how "trustworthy" it looks or how encrypted it is. I also don't hesitate to do financial stuff etc. via it.

              "Security by obscurity" doesn't work. Encrypting things twice or thrice doesn't increase safety. Taking a wired connection over wireless doesn't increase safety. You choose one good tool that you can trust, then you can forget about all the other mediocre tools.

              For internet communication, that tool is certificates and strong encryption, as in HTTPS and SSL/TLS. There are no realistic scenarios how even a malicious attacker who completely controls the WiFi can bypass those security mechanisms.

              1 Reply Last reply
              • AxtremusA Axtremus

                For personal use, I don't really see the need.

                I do not see the need to "hide" which Internet sites I connect to. Using a commercial VPN service simply means that the VPN provider has a full record of which Internet sites I connect to.

                For encryption, it's pretty much HTTPS (TLS) everywhere these days. I am comfortable enough with that to not bother with getting a VPN service.

                The only caution I'd advise is this: be careful with public Wi-Fi hotspots. Most of the time you really do not know who operate these Wi-Fi hotspots and what data security and data privacy policies govern these hotspots, or if such policies exist at all. When you are not at home (where you operate the Wi-Fi network) and not at work (where your employer operates the Wi-Fi network), just use your mobile phone's cellular data to get onto the Internet, tether your laptop through your mobile phone if you need to get online with your laptop.

                KlausK Offline
                KlausK Offline
                Klaus
                wrote on last edited by
                #27

                @Axtremus said in Beware these VPNs:

                When you are not at home (where you operate the Wi-Fi network) and not at work (where your employer operates the Wi-Fi network), just use your mobile phone's cellular data to get onto the Internet, tether your laptop through your mobile phone if you need to get online with your laptop.

                And how would that improve security? It isn't very hard to fake an access point for cellular data ("IMSI catcher").

                1 Reply Last reply
                • KlausK Offline
                  KlausK Offline
                  Klaus
                  wrote on last edited by Klaus
                  #28

                  Overall, I would say that if you make sure to get a few things right:

                  • configure your email to use strong encryption and certificates and disable potentially dangerous attachments
                  • use a modern browser and an operating system with the latest security updates
                  • pay attention to the usage of HTTPS, the validity of certificates, and warnings about security issues from your browser
                  • make sure that any other non-browser-based communication that is security-relevant uses strong encryption and certificates
                  • don't install stuff from random internet locations.

                  then this will contribute 1000x more to the safety of your internet usage than using VPNs, avoiding public WiFis, etc. For instance, if you use a VPN, then the part of the connection from the VPN provider to the host you are communicating with is still unprotected. If you use a wired connection instead of wireless, this only changes the place where an attacker needs to attack but it doesn't make it inherently more difficult.

                  Choose the one right tool for the job instead of the combination of multiple mediocre tools.

                  1 Reply Last reply
                  • AxtremusA Offline
                    AxtremusA Offline
                    Axtremus
                    wrote on last edited by
                    #29

                    Cellular data — once you get to 3G or 4G LTE, mutual authentication kicks in and your phone verifies the cellular service. The cost and sophistication to spoof a cellular service that can fool the mutual authentication mechanism are high enough to discourage most hackers. No “mutual authentication” with 2G or older cellular standards, but you’ll notice the dismal speed when your phone’s connection is somehow downgraded to 2G.

                    Avoiding untrusted networks — once your machine is attached to a network, it’s not all about you making sure you use only TLS to connect to other sites/servers, but also about exposing your machine to attacks by others from that network. This is where keeping up with OS security updates helps. iPads and iPhones do better than most Android phones in this regard because Apple is pretty good with making sure that new iOS upgrades are compatible with most iPhones and iPads out there. But Google cannot do the same because even after Google releases a new version of Android, it’s still up to the OEMs (Samsung, Motorola, HTC, etc.) to pick up that new version of Android and customize it for their phones and then make those customized versions available to the end users. Even today I still see name brand Android phones that are “stuck” with older Android OS that is one or two major releases behind the latest.

                    1 Reply Last reply
                    • KlausK Offline
                      KlausK Offline
                      Klaus
                      wrote on last edited by Klaus
                      #30

                      Ax, the way I understand it is that first of all there are all kinds of loopholes due to required interoperability with 2G network, and secondly, you could still do a "man-in-the-middle" attack and just use the authentication replies from the base station. You can easily find "a DIY IMSI catcher for $300" tutorials on the internet.

                      Or, for that matter, you could just listen passively to the cellular traffic. Yes, it's encrypted, but so is https.

                      1 Reply Last reply
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • Users
                      • Groups