Security and benefits of using VPN services

Reports-icon

Benefits of using VPN services and indicators when selecting a VPN provider

When using VPN service  Secure communication-Concealment of communication contents-Anonymization of communication In addition to the benefits of, by specifying the connection server Impersonate the location information of the connection sourceBecause you can Geoblock (Technology that imposes restrictions on geographical location) can be avoided.

What is VPN
A virtual private network (VPN) connects to the Internet by creating a tunnel called encryption, which ensures privacy protection by ensuring communication security and anonymization of IP addresses.

Secure communication

Communication security was a problem with HTTP connections, with HTTPS traffic exceeding 2017% in 90 as Google promoted HTTPS to encrypt communication between web browsers and servers. Man-in-the-middle attack The risk of eavesdropping due to (Man-in-the-middle attack) has been greatly reduced, but the Wi-Fi free spot that has increased due to the spread of smartphones is due to Wi-Fi hackers. Eavesdropping , Spoofing Are exposed to the risk of.

How to setup a VPN-001

IPA Technical Watch "Threats and Countermeasures Related to Public Wireless LAN Use"

There are many opportunities to use free spots Many smartphone apps do not have encrypted communication, and IPA (Information-technology Promotion Agency) also recommends the use of VPN services to protect the communication content.
Three out of four Japanese tourists use the free WiFi they visit.

How to setup a VPN-002

By using the VPN service Communication is protected by encryption and tunnelingFor Eavesdropping Can be prevented.

Concealment of communication contents

To the internet ISP You connect through (Internet service provider), but when you use the VPN service, the connection destination via the ISP becomes the VPN server, and the communication between the VPN server and the user is encrypted. The ISP only has logs that connect to the VPN server.

Log storage and censorship by ISP

The ISP keeps a log of communications that have passed through the ISP's network, and when a request for disclosure of personal information based on legal grounds such as a court warrant is approved, the name and address of the contractor from the IP address that accessed the server. Etc. are disclosed.

In Japan, privacy is protected, Article 4, Paragraph 1 of the Telecommunications Business Law. Communication secret There is The right to prevent the content and destination of communication from being known or leaked to a third party Is guaranteed,Obtain the consent of the person Or Justice-Legitimate defense-Emergency evacuation Corresponds to Infringement of confidentiality of communications is permitted only when there is a reason for illegal deterrence..
The ISP has a function as a censorship that can monitor the communication contents of users and operate without permission. Reasons for illegal deterrence If it is confirmed, the communication will be blocked by the DNS server or dedicated device in the ISP's network when the communication passes through the ISP. ブ ロ ッ キ ン グ In April 2018, the government requested ISPs to block the three sites of Manga Village, Anitube, and Miomio, and the police agency and others have restricted access to sites related to child pornography.
SIGGINT

Edward Snowden NSA According to (National Security Agency)International surveillance network By revealing the existence of (PRISM), an urban legendary public institution SIGGINT There is a growing sense of caution about (interception of communications), and an increasing number of people are taking privacy protection measures even at the individual level.

Five Eyes, including the United States and the United Kingdom, collaborate with Japan, Germany and France Cyber ​​attacks, sharing confidential information in China 

A framework that includes Japan, Germany, South Korea, and France in Faiz Eyes to share information on China's cyber attacks in 2019 5 Eyes Alliance + Was launched.
Faiz eyesIs a secret agreement on intelligence signed between the United States and the United Kingdom during World War II UKUSA Agreement Is based on, and after World War II, Canada, Australia, and New Zealand joined to collect, analyze, and share information domestically and internationally.

Anonymization of communication

Although it is related to the concealment of communication contents, when using the VPN service, it connects to the VPN server via the ISP and connects to the browsing site from the VPN server, so not only the ISP but also the browsing site server of the VPN server Only the IP address is recorded.

Normally, the identity of the user is determined by collating the IP address of the connection source with the ISP, but by using the VPN service, the user's activity is limited to the connection to the VPN server, and the connection source can be hidden or spoofed.

Since many VPN providers have servers installed in various countries around the world, it is possible to access sites that do not accept connections from overseas by connecting to the VPN server in the target country.

VPN provider

VPN is a useful service for communication security and privacy protection, but VPN providers can collect user traffic information like ISPs, and the reliability of VPN providers is important.

Many VPN providers do not use a no-log policy, especially for free mobile VPN apps that use user activity as advertising and traffic analysis data or collect data in their privacy policy. There are services that are not worthy of trust, such as the usage of is not described.

How to setup a VPN-004

Auditing from a third party ensures security when selecting a VPN provider.

VPN providers audited by security agencies publish reports.
No logs policy

Since the VPN provider can record the behavior history of the same user as the ISP, it is essential to adopt a no-log policy that does not save the access log if you want to completely hide the behavior history.

DNS leak (DNS leak)

In the VPN service, it is common to use the encrypted DNS server provided by the VPN provider, and the IP address of the access source is not visible, but the IP address that should not be visible is visible. DNS leak Called (DNS leak).

How to setup a VPN-005

When the connection to the encrypted DNS server is lost, the DNS query is forwarded to the DNS server of the unencrypted ISP to maintain communication, so the VPN service forcibly shuts down the network. Kill switch It implements a feature to prevent DNS leaks.

Provider's base

Even a provider that adopts a no-log policy may be legally forced by a public institution to monitor a specific IP address or log an account, and the provider's location is also an indicator when selecting a service.

Privacy Haven The British Virgin Islands, Panama, Seychelles, Cayman Islands, and Malaysia are legally protected for user privacy and are often home to top VPN providers.
Warrant Canary

Warrant canary Indicates that a company that handles personal information, such as a VPN provider, has not received a data submission request from a public institution.

How to setup a VPN-003

Warrant canary It has no legal basis and is not a guarantee of security, but it is an indicator of privacy protection.

Test tool

On the VPN provider's site IP address checker-DNS leak test-WebRTC leak test Etc. are installed, and when you access it Leaking Is displayed.

VPN-002

The tools installed on the site All access from environments other than your own VPN service is leaked Is displayed, so it is not credible at all.

Check for DNS leaks

Check for DNS leaks by visiting the test site, not the provider's site.

IP Leak.net

VPN-012

IP Leak.net , this means a Your IP addressDNS Address If is the same IP address and the country of the connected VPN server is displayed, there is no DNS leak.

IObit-017

If there is a DNS leak, the DNS server is different from the connected server, such as in Japan.

Check communication speed

Check the communication speed by connecting to the fastest server with the VPN app.

SPEED TEST

VPN-013

Make sure that there is no significant slowdown by measuring with and without VPN connection.

Provider integration

In recent years, VPN providers have been integrated through acquisitions, but there are many cases where the actual situation of the parent company and operations is unclear.

North Security

Lithuanian North Security The NordVPN The top VPN provider that offers.

  • October 2021: Atlas VPNAcquired
  • February 2022: SurfsharkMerged with
Kape Technologies

Kape Technologies PLC Is a cybersecurity company owned by Israeli millionaire Teddy Sagi.

  • October 2017: CyberGhost Acquired
  • October 2018: Zenmate VPN Acquired
  • February 2019: Private Internet AccessAcquired
  • February 2021: ExpressVPN Acquired
Kape Technologies The predecessor of developed a browser extension Crossrider The program was notorious for being used by malware, and Teddy Sagi was also convicted of bribery and fraud in the past, threatening the security of the acquired VPN service. but, Crossrider Renewed its management team in 2016 and converted from a program development company to a cyber security company, and the acquired VPN provider is also operating independently.

VPN comparison site

Many VPN services offer affiliate programs, and some VPN comparison sites and ranking sites focus on profits, while others are set up by group companies of VPN providers.

VPN-001

The index of ranking is communication speed-Active log-Base-Anonymity-Streaming service support-Price However, since the communication speed differs depending on the location of the connection source and connection destination, it is not known until the actual connection is made.

Cases that undermine VPN trust

VPN providers that are not audited by a third party have opaque data processing and are actually experiencing problems.

PureVPN provides network logs problem
Should have adopted the 2017 nolog policy PureVPN Helped identify users by submitting network logs (records of users connecting to PureVPN) at the request of the US FBI.
PureVPN explains that the submitted network log is automatically generated for troubleshooting etc. and that the user's activity is not saved. No logs policy The reliability of the was greatly impaired.
In 2018 PureVPN revised its privacy policy, US Information Systems Auditor Altius IT It is more zero log certified and is currently unable to identify an individual from the user's active log.
Hotspot Shield Free VPN routing issues to ad networks
2017 U.S.-based non-profit organization Center for Democracy & Technology The   Hotspot Shield Free VPN Points out that is routing user traffic to the ad network.
At the time Hotspot Shield Free VPN The privacy policy was that user traffic was stored and could be disclosed to third parties.
Hotspot Shield Free VPN Revised its privacy policy in June 2018, not storing user traffic,Hotspot Shield Free VPNOnly the user's location information is used for advertisements, and the notation has become more specific and privacy protection has been strengthened than before.
Onavo Protect user data collection issues
Israeli software vendor acquired by Facebook Onavo Was offering a free VPN app Onavo Protect Analyzing the traffic sent using the VPN app reveals that Facebook was using it for sales strategies such as acquisitions, which became a big problem and let us know that the VPN app can act as spyware. rice field.
Onavo Protect Has been removed from the Google Play store.
Exit node utilization and traffic sales issues with Hola VPN

Israeli software vendor Hello Was offered by Hola VPN Now, let ’s take a look at the user ’s device. Exit node It was discovered that it was being used as (the IP that eventually accessed the server), and VPN users were selling bandwidth for $ 1 per GB.

When used for crime as an exit node Computer remote control incident There is a possibility of being arrested as a suspect of a crime that I do not remember at all.

Related article

PayPal-icon-1

Introducing and using PayPal

Founded in 1998, PayPal, a pioneer of Fintech, is an online payment agency service originating in the United States and has a solid support system. ]

dropbox_icon

Installing and using Dropbox for Gmail

Gmail extension Dropbox for Gmail is an add-on for Gmail provided by Dropbox, and Gmail […]

google

Obtaining and setting up a Google account

Creating accounts and security settings required to use various Google services Google accounts are Gmail, YouTube, Chrome browser, Google Drive, Karen […] provided by Google.

Infect-icon

What to do when you suspect a virus infection on your computer

What to do when computer virus infection is suspected for free and basic knowledge of malware The two major functions of security software are antivirus and firewall, and antivirus mainly performs prevention, quarantine, and removal, and phi […]

Leawo-co-icon

How to purchase a Leawo product and register a license code

 Introducing Leawo's sale information, purchase procedure and license registration method Leawo is a brand of multimedia tools developed by software vendor Moyea Software based in Shenzhen, China, China […]