LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-18-2010, 11:37 AM   #1
Dogs
Member
 
Registered: Aug 2009
Location: Houston
Distribution: Slackware 13.37 x64
Posts: 105

Rep: Reputation: 25
Do any of ya'll use VyprVPN?


http://vyprvpn.goldenfrog.com/

As per marketing proposals -

Quote:
How it Works




Simply sign-in to activate a secure, encrypted VyprVPN connection and all your online communication (web addresses, emails, instant messages, VoIP, social networking, etc.) is "scrambled" as it travels through your Internet service provider (ISP) to VyprVPN servers, making it impossible for eavesdroppers to see what you're transmitting.




Once your online traffic reaches the VyprVPN servers, it's stripped of your Internet Protocol (IP) address, tagged with a VyprVPN IP address, and sent to its final destination on the Internet. Now hackers and identity thieves don't see your identity associated with an email, for example, they see VyprVPN.




VyprVPN keeps your privacy intact.

It seems like an interesting idea, and since giganews has been my usenet provider for the last 6 years, I get it for free. I was wondering if anyone could explain the concept a little more in detail for me to get a better understanding.

What I figure is - All of the traffic coming from your NIC is encrypted, and its destination is a VPN server which will accept your traffic, decrypt your information, replace personal info with VPN info or something, and pass it on to the website that was initially to be accessed.


So, after you click send or whatever, the process is

encrypt, send to VPN(requested address, requesting address, authorization, etc), to ISP which just gets garbage, to VPN which decrypts/strips the message, then to the destination, which will send a reply back to the VPN, then back to the ISP, and then back to you, right?

Last edited by Dogs; 03-18-2010 at 11:40 AM.
 
Old 03-18-2010, 01:00 PM   #2
MensaWater
LQ Guru
 
Registered: May 2005
Location: Atlanta Georgia USA
Distribution: Redhat (RHEL), CentOS, Fedora, CoreOS, Debian, FreeBSD, HP-UX, Solaris, SCO
Posts: 7,831
Blog Entries: 15

Rep: Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669
It doesn't really prevent snooping - it just prevents snooping directly from your location except that since VyprVPN has to decrypt it to send it on to its original destination THEY could snoop it all.

Anyone snooping traffic out of VyprVPN's servers could see the traffic to the destination though of course they wouldn't see where it originated (your place) but VyprVPN itself could and if anyone hacked them they could as well.

Also encryption/decryption all by itself slows things down - add in the latency of going to a 3rd party and some of your pages might be dog slow.
 
Old 03-19-2010, 06:18 AM   #3
XavierP
Moderator
 
Registered: Nov 2002
Location: Kent, England
Distribution: Debian Testing
Posts: 19,192
Blog Entries: 4

Rep: Reputation: 475Reputation: 475Reputation: 475Reputation: 475Reputation: 475
Moved: This thread is more suitable in Linux-Security and has been moved accordingly to help your thread/question get the exposure it deserves.
 
Old 03-19-2010, 06:31 AM   #4
slimm609
Member
 
Registered: May 2007
Location: Chas, SC
Distribution: slackware, gentoo, fedora, LFS, sidewinder G2, solaris, FreeBSD, RHEL, SUSE, Backtrack
Posts: 430

Rep: Reputation: 67
Quote:
Originally Posted by Dogs View Post
http://vyprvpn.goldenfrog.com/

As per marketing proposals -




It seems like an interesting idea, and since giganews has been my usenet provider for the last 6 years, I get it for free. I was wondering if anyone could explain the concept a little more in detail for me to get a better understanding.

What I figure is - All of the traffic coming from your NIC is encrypted, and its destination is a VPN server which will accept your traffic, decrypt your information, replace personal info with VPN info or something, and pass it on to the website that was initially to be accessed.


So, after you click send or whatever, the process is

encrypt, send to VPN(requested address, requesting address, authorization, etc), to ISP which just gets garbage, to VPN which decrypts/strips the message, then to the destination, which will send a reply back to the VPN, then back to the ISP, and then back to you, right?
Thats correct for the most part. The pages will not be much slower if at all. Giganews who hosts it has multiple gigabit connections.
 
Old 03-19-2010, 07:04 AM   #5
cantab
Member
 
Registered: Oct 2009
Location: England
Distribution: Kubuntu, Ubuntu, Debian, Proxmox.
Posts: 553

Rep: Reputation: 115Reputation: 115
Your privacy becomes entireley dependent on VyprVPN. They could disclose information voluntarily, have it seized by law enforcement, or be hacked or have hardware stolen by criminals. Even if they properly delete logs in normal operation, an attacker could monitor connections starting from the time of attack. The encryption could also be broken.

All these considerations apply to any such scheme where there is a single organisation responsible for relaying and anonymising your data.

Tor would seem to be a more secure system, though I don't know if it has its own vulnerabilities.

(EDIT: I'm probably using 'secure' in quite a loose sense)

Last edited by cantab; 03-22-2010 at 04:18 AM.
 
Old 03-21-2010, 09:45 PM   #6
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by cantab View Post
Tor would seem to be a more secure system, though I don't know if it has its own vulnerabilities.
Well, I see them both about the same with regards to security. One could argue the threat to be greater for either method, albeit for different reasons. Still, Tor does at least provide you with a great deal of anonymity when you use it right, while this VPN solution provides the exact opposite AFAICT (considering that now all your traffic is tied to your credit card). Regardless, the same advice applies to both: Keep your end-to-end traffic encrypted, so that neither your Tor exit node or your VPN service provider can snoop on you (the VPN service provider will still know which sites you use, though).
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Howdy Ya'll...... tesaba LinuxQuestions.org Member Intro 1 09-02-2009 09:02 AM
Hi ya'll - here's what I'm thinking right now... realsimple2000 LinuxQuestions.org Member Intro 5 06-21-2009 02:40 PM
Howdy, ya'll DarthPleco LinuxQuestions.org Member Intro 2 05-09-2009 11:23 PM
Howdy ya'll scooper LinuxQuestions.org Member Intro 1 04-07-2009 06:03 PM
What do ya'll think of my site about nothing? KnightAbel General 0 09-14-2002 03:18 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:15 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration