Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Looking for VPN recommendations

Looking for VPN recommendations

Scheduled Pinned Locked Moved The Lounge
questioncsharparchitecturehelp
57 Posts 20 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S Stefan_Lang

    Ah, you're thinking of browsing. I'm more concerned about stuff like Microsofts CompatTelRunner that does scan your entire hard disks even if you don't participate in CEIP. MS states that (1) it should only be running if you participate, which is a blatant lie, (2) that you can uninstall and hide the related KB update(s), which doesn't help since they wrapped up all KB updates in the cumulative updates, and hidden updates will keep getting unhidden on a regular basis, (3) that it doesn't report any data that I should be concerned about, which I don't believe because of (1) and (2). Any confidential data stored on my disks, including e.g. stuff related to my work, is effectively compromised by MS, no less.

    GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)

    H Offline
    H Offline
    Herbie Mountjoy
    wrote on last edited by
    #33

    I disabled the CompatTelRunner service only to find it had been re-enabled a few days later. Seems as if the only sure way is to pull the RJ45 out.

    We're philosophical about power outages here. A.C. come, A.C. go.

    S 1 Reply Last reply
    0
    • S Shuqian Ying

      The other option is to use 1-NET gateways :-O . VPN works at IP level which makes it invisible to applications once it is setup properly. But there are at least three drawbacks: 1) it requires at least one LAN (local area network) to have a public IP which is expensive or to use some kind of dynamic IP/name mapping services. 2) VPN connected LANs can not have same (private) IP address space, otherwise VPN will not know how to route data. Since most LAN are setup using default private IP space, it is most likely that they will collide in IP space without readjusting. This makes it not scaleable. 3) Setting up of VPN is not easy. I have almost zero knowledge about TOR however both TOR and 1-NET gateways uses SOCKS protocol to connect client applications. 1-NET gateways do not have the above limitations of VPN, namely it does not require to acquire any public IP address, it is scalable since it does not require to make any change to existing LANs and it is easy to setup. It is under internal testing right now. The present message is in fact sent to codeproject through a pair of above mentioned gateways separated by Pacific ocean connected by a very slow line: one is in Asia and the other one is in North America. It can make use of a user's network bandwidth very efficiently, meaning it can be very fast as long as the network bandwidth is high. We are using it to do web browsing, trans-LAN administration (ssh, remote desktop, etc.) now. It can be used by any software system that knows how to talk via SOCKS. Drop me a note if your are interested in testing it when it is ready (including finishing documentation, packaging, etc.) ...

      Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

      T Offline
      T Offline
      TMarkus
      wrote on last edited by
      #34

      Shuqian Ying wrote:

      1. Setting up of VPN is not easy.

      This is absolute rubbish in most cases. I use CyberGhostVPN and once you install the client all you have to do is login, select the country and you're done. If so desired, you can even select a specific server in the country. They have almost 900 servers in 27 countries and do not keep logs so there will be nothing to hand over when some 3-letter agency comes calling.

      S 1 Reply Last reply
      0
      • S Shuqian Ying

        If obfuscation is what you are after, then VPN only offer a leaky protection since it works at IP level. The domain names have to be resolved before leaving the entry point of VPN, which means your applications (browser or anything else) have to make requests to local DNS providers ... 1-NET and maybe TOR can let the other end of the "VPN" tunnel to make DNS requests for you and thus transfer you browsing history completely to the other end ...

        M Offline
        M Offline
        Mike Marynowski
        wrote on last edited by
        #35

        I don't know what you mean by it being leaky. Once you are connected to the VPN, DNS requests will go encrypted through the VPN as well. VPNs would be kind of pointless if that wasn't the case.

        Blog: [Code Index] By Mike Marynowski" Company: Singulink

        S 1 Reply Last reply
        0
        • Graeme_GrantG Graeme_Grant

          I've always like PIA (Private Internet Access). But if you want a more independent review, here is an old-ish review for you: Which VPN Providers Take Your Anonymity Seriously? - TorrentFreak[^]

          M Offline
          M Offline
          Mike Marynowski
          wrote on last edited by
          #36

          I can vouch for PIA as well. Reasonably quick and it cost something like $40 for a whole year. That said, don't expect 100Mbps through it, so if you are downloading large files you want quickly you will probably want to disconnect, but it's the best VPN I've used in that price range by far and I've tried a several of the top recommended options on review sites.

          Blog: [Code Index] By Mike Marynowski | Business: Singulink

          1 Reply Last reply
          0
          • T TMarkus

            Shuqian Ying wrote:

            1. Setting up of VPN is not easy.

            This is absolute rubbish in most cases. I use CyberGhostVPN and once you install the client all you have to do is login, select the country and you're done. If so desired, you can even select a specific server in the country. They have almost 900 servers in 27 countries and do not keep logs so there will be nothing to hand over when some 3-letter agency comes calling.

            S Offline
            S Offline
            Shuqian Ying
            wrote on last edited by
            #37

            I know it easy if you use a third party service which host your "other endpoint" for you. But then you are letting the service provider as an insider of you network. That is why they almost all declare that they do not do logging, etc. Do you really trust them, that is the problem ... Try to host the other endpoint your self! Just try it, then you will know ...

            Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

            T M 2 Replies Last reply
            0
            • M Mike Marynowski

              I don't know what you mean by it being leaky. Once you are connected to the VPN, DNS requests will go encrypted through the VPN as well. VPNs would be kind of pointless if that wasn't the case.

              Blog: [Code Index] By Mike Marynowski" Company: Singulink

              S Offline
              S Offline
              Shuqian Ying
              wrote on last edited by
              #38

              I am talking about true VPN working at IP level, in which case the application has to resolve any none IP address into IP before using VPN ... Any one that claim otherwise is not providing true VPN service (they most likely are providing one endpoint SOCKS proxy service, but it's different from 1-NET which contains pair of SOCKS endpoints that forms a secured tunnel) Suppose a user has two zones (LANs), one is the one he/she want to secure (obscure, in OP's word) and the other one is "safe" and the application is in the first zone. The user want to delegate all his/her internet activity to the second one. If one use VPN to connect (tunnel) the two zones, the all the network layer "authorities" (service provider, ISP, etc ...) in the first zone still know what the use is doing since the use is making DNS requests in the first zone and they can control what are visible by the user by controlling the DNS providers. That is what leaky mean in my post. But using 1-NET secured tunnels, one can choose to do DNS requests inside the other zone ...

              Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

              M 1 Reply Last reply
              0
              • S Shuqian Ying

                I know it easy if you use a third party service which host your "other endpoint" for you. But then you are letting the service provider as an insider of you network. That is why they almost all declare that they do not do logging, etc. Do you really trust them, that is the problem ... Try to host the other endpoint your self! Just try it, then you will know ...

                Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

                T Offline
                T Offline
                TMarkus
                wrote on last edited by
                #39

                Do you plan to have your own servers in 27 countries? If you do, start your own VPN company and make some money in the process. Otherwise, having your own VPN server is 1. unnecessary because there are plenty of VPN service providers 2. impractical because you will be severely limited in your access points 3. an unnecessary, potentially prohibitive, expense you have to carry 99.9% of people just want some reasonable way to not be constantly tracked or spied upon or to have access to websites that would otherwise not be accessible because of geographic limitations. For that purpose, any good VPN service is more than adequate and that was what the poster was looking for. The only thing that really counts is that the VPN provider does NOT keep logs and that they are NOT based in the USA or the UK, the two largest mass surveillance centres in the world.

                1 Reply Last reply
                0
                • Graeme_GrantG Graeme_Grant

                  Enjoy! ;)

                  W Offline
                  W Offline
                  William Putman
                  wrote on last edited by
                  #40

                  I have used PIA over a year and recommend it. But you also asked about TOR. PIA provides privacy so that your internet provider can't spy on you. It also provides encryption so you are safe on public Wifi. However, your browser also collects data on your browsing habits, so something like TOR is extremely valuable, in addition to a VPN. I don't use TOR, but I configured my browsers (both Chrome and Firefox) to clear my browsing history when I exit.

                  1 Reply Last reply
                  0
                  • S Stefan_Lang

                    Ah, you're thinking of browsing. I'm more concerned about stuff like Microsofts CompatTelRunner that does scan your entire hard disks even if you don't participate in CEIP. MS states that (1) it should only be running if you participate, which is a blatant lie, (2) that you can uninstall and hide the related KB update(s), which doesn't help since they wrapped up all KB updates in the cumulative updates, and hidden updates will keep getting unhidden on a regular basis, (3) that it doesn't report any data that I should be concerned about, which I don't believe because of (1) and (2). Any confidential data stored on my disks, including e.g. stuff related to my work, is effectively compromised by MS, no less.

                    GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)

                    S Offline
                    S Offline
                    Shuqian Ying
                    wrote on last edited by
                    #41

                    In this case, you should not use a VPN to provide protection since VPN are not visible to applications, anything "your" application can do can also be done by third party applications ... I have not think this way before, but I belief there should be a solution to this problem using security gateways (black list them is one of potential the solution). But it's not build in yet, I will think about it

                    Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

                    1 Reply Last reply
                    0
                    • S Stefan_Lang

                      True. But supposedly many of them don't actually store these data. My greatest fear isn't so much who sees it now, but who may be gaining access to it for darker reasons in the future. With most internet companies located in the US, any of them might hand over data about me to any three letter 'intelligence' organization on a whim. Also, hackers have the nasty habit of breaking into even the most secured databases, and they may have even worse ideas about what they could do with it. Data that isn't stored, can't be handed over, or stolen.

                      GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)

                      S Offline
                      S Offline
                      Shuqian Ying
                      wrote on last edited by
                      #42

                      Stefan_Lang wrote:

                      many of them don't actually store these data

                      You just don't know it.

                      Stefan_Lang wrote:

                      Data that isn't stored, can't be handed over, or stolen.

                      What about hand over on the fly :)

                      Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

                      S 1 Reply Last reply
                      0
                      • S Shuqian Ying

                        I am talking about true VPN working at IP level, in which case the application has to resolve any none IP address into IP before using VPN ... Any one that claim otherwise is not providing true VPN service (they most likely are providing one endpoint SOCKS proxy service, but it's different from 1-NET which contains pair of SOCKS endpoints that forms a secured tunnel) Suppose a user has two zones (LANs), one is the one he/she want to secure (obscure, in OP's word) and the other one is "safe" and the application is in the first zone. The user want to delegate all his/her internet activity to the second one. If one use VPN to connect (tunnel) the two zones, the all the network layer "authorities" (service provider, ISP, etc ...) in the first zone still know what the use is doing since the use is making DNS requests in the first zone and they can control what are visible by the user by controlling the DNS providers. That is what leaky mean in my post. But using 1-NET secured tunnels, one can choose to do DNS requests inside the other zone ...

                        Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

                        M Offline
                        M Offline
                        Mike Marynowski
                        wrote on last edited by
                        #43

                        Abso-effin-lutely not. I don't know who you got that information from but it is 100% wrong. When you are connected to a VPN your DNS server becomes the DNS server assigned to the VPN connection, not your ISPs DNS server, and all DNS requests are encrypted and tunneled like all other packet. How do you think connecting to a corporate intranet through a VPN would work if it was using your ISP's public DNS server to resolve requests? It wouldn't... VPN doesn't work "on an IP level", it works on a packet level.

                        Blog: [Code Index] By Mike Marynowski | Business: Singulink

                        S 1 Reply Last reply
                        0
                        • M Mike Marynowski

                          Abso-effin-lutely not. I don't know who you got that information from but it is 100% wrong. When you are connected to a VPN your DNS server becomes the DNS server assigned to the VPN connection, not your ISPs DNS server, and all DNS requests are encrypted and tunneled like all other packet. How do you think connecting to a corporate intranet through a VPN would work if it was using your ISP's public DNS server to resolve requests? It wouldn't... VPN doesn't work "on an IP level", it works on a packet level.

                          Blog: [Code Index] By Mike Marynowski | Business: Singulink

                          S Offline
                          S Offline
                          Shuqian Ying
                          wrote on last edited by
                          #44

                          Unfortunately, sometimes your browser will just ignore that you have a VPN set up and will send the DNS request straight to your ISP. That’s called a DNS leak. This can lead to you think that you’ve stayed anonymous and that you’re safe from online surveillance, but you won’t be protected. How DNS Leaks Can Destroy Anonymity When Using a VPN, And How to Stop Them[^]. Therefore it's not 100% after all ... I mean works at level 3, level 2 knows no IPs so it does not know how to route base on IP addresses

                          Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

                          M 2 Replies Last reply
                          0
                          • S Shuqian Ying

                            Stefan_Lang wrote:

                            many of them don't actually store these data

                            You just don't know it.

                            Stefan_Lang wrote:

                            Data that isn't stored, can't be handed over, or stolen.

                            What about hand over on the fly :)

                            Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

                            S Offline
                            S Offline
                            Stefan_Lang
                            wrote on last edited by
                            #45

                            Shuqian Ying wrote:

                            Stefan_Lang wrote:

                            many of them don't actually store these data

                            You just don't know it.

                            Its' all about trust. If it turns out a VPN provider was lying about some relevant aspect of his business, that would ruin his business. I don't trust in VPN providers as much as the fact that they can't afford to compromise that trust.

                            Shuqian Ying wrote:

                            What about hand over on the fly :)

                            I would consider that less of a problem, since I'm much more concerned about data sitting around in a database somewhere, waiting to be hacked by malicious third parties. Also, what would be the point? If someone wanted to spy on traffic to and from me, he'd need to know my identity anyway, breaking the main layer of protection that a VPN provides. At that point, rather than spying on 193 VPN servers all over the world they could just ask my ISP to hand over the streams.

                            GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)

                            1 Reply Last reply
                            0
                            • H Herbie Mountjoy

                              I disabled the CompatTelRunner service only to find it had been re-enabled a few days later. Seems as if the only sure way is to pull the RJ45 out.

                              We're philosophical about power outages here. A.C. come, A.C. go.

                              S Offline
                              S Offline
                              Stefan_Lang
                              wrote on last edited by
                              #46

                              If you don't uninstall the related Windows kb updates, it will be re-enabled automatically. If you don't hide them after uninstallation, they will be reinstalled with the next Windows update. Even if you hide them, they will be unhidden with the next Windows update rollup. Personally, I switched to manual updates, and when I do an update I will remove the pests that I don't want afterwards:

                              Quote:

                              KB971033 Description of the update for Windows Activation Technologies KB2952664 Compatibility update for upgrading Windows 7 KB2990214 Update that enables you to upgrade from Windows 7 to a later version of Windows KB3021917 Update for Windows Customer Experience Improvement Program KB3022345 Update for customer experience and diagnostic telemetry KB3035583 Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1 KB3044374 Update that enables you to upgrade from Windows 8.1 to a later version of Windows KB3068708 Update for customer experience and diagnostic telemetry KB3075249 Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7 KB3080149 (update for CEIP and telemetry)

                              (taken from Meine Methode die Telemetrydatenerfassung au… | Forum - heise online[^] ; also see Windows update KB2952664 (Compattelrunner.exe) cannot be uninstalled from Windows 7 - Super User[^] ) I expect this method will keep working for Windows 7 until MS stops rolling out updates.

                              GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)

                              1 Reply Last reply
                              0
                              • S Shuqian Ying

                                I know it easy if you use a third party service which host your "other endpoint" for you. But then you are letting the service provider as an insider of you network. That is why they almost all declare that they do not do logging, etc. Do you really trust them, that is the problem ... Try to host the other endpoint your self! Just try it, then you will know ...

                                Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

                                M Offline
                                M Offline
                                Master68
                                wrote on last edited by
                                #47

                                Having the other endpoint of the VPN under your own control makes the whole thing quite useless for obfuscation. If you are the known owner of the VPNs exit point, then you are identifiable again. Using a VPN for obfuscation only makes sense if you are NOT the exit point yourself an - if possible - share the same exit point with hundreds of other "unknown" people. The downside is of course, that you have to trust the VPN provider that he does his job as expected and really makes it impossible to track the traffic back to you.

                                1 Reply Last reply
                                0
                                • S Shuqian Ying

                                  Unfortunately, sometimes your browser will just ignore that you have a VPN set up and will send the DNS request straight to your ISP. That’s called a DNS leak. This can lead to you think that you’ve stayed anonymous and that you’re safe from online surveillance, but you won’t be protected. How DNS Leaks Can Destroy Anonymity When Using a VPN, And How to Stop Them[^]. Therefore it's not 100% after all ... I mean works at level 3, level 2 knows no IPs so it does not know how to route base on IP addresses

                                  Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

                                  M Offline
                                  M Offline
                                  Mike Marynowski
                                  wrote on last edited by
                                  #48

                                  The way you were describing it before you were implying that it is intended that VPNs work that way and all of them work that way, that you *WILL* get leaky protection from a VPN. That's not the case. If that's happening, its a bug or a bad configuration. As the article you linked to states, most of the top VPN providers provide leak detection/prevention already, so a good VPN is a perfectly reasonable way to fully protect yourself.

                                  Blog: [Code Index] By Mike Marynowski | Business: Singulink

                                  S 1 Reply Last reply
                                  0
                                  • S Shuqian Ying

                                    Unfortunately, sometimes your browser will just ignore that you have a VPN set up and will send the DNS request straight to your ISP. That’s called a DNS leak. This can lead to you think that you’ve stayed anonymous and that you’re safe from online surveillance, but you won’t be protected. How DNS Leaks Can Destroy Anonymity When Using a VPN, And How to Stop Them[^]. Therefore it's not 100% after all ... I mean works at level 3, level 2 knows no IPs so it does not know how to route base on IP addresses

                                    Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

                                    M Offline
                                    M Offline
                                    Mike Marynowski
                                    wrote on last edited by
                                    #49

                                    "VPN only offer a leaky protection since it works at IP level" That's the part I'm referring to which was misleading. A properly configured VPN or one that checks for leaky DNS will keep you protected. As per your article: So which VPNs include DNS leak protection? According to BestVPNz.com, Private Internet Access, TorGuard (both of which made it to our best VPNs list), VPNArea, PureVPN, ExpressVPN, VPN.AC, and LiquidVPN all provide protection.

                                    Blog: [Code Index] By Mike Marynowski | Business: Singulink

                                    S 1 Reply Last reply
                                    0
                                    • S Stefan_Lang

                                      Thank you very much for the link. I always like a (somewhat?) neutral source to compare products.

                                      GOTOs are a bit like wire coat hangers: they tend to breed in the darkness, such that where there once were few, eventually there are many, and the program's architecture collapses beneath them. (Fran Poretto)

                                      K Offline
                                      K Offline
                                      Kyle Moyer
                                      wrote on last edited by
                                      #50

                                      My only experience is with PIA (Private Internet Access) as well. It does well enough for what I need. Speeds were not that great in the beginning (2 maybe 3 years ago) but are now up to par. I notice only a marginal drop in bandwidth while connected, which is to be expected due to VPN overhead. They also have a large number of regions you can connect to for circumventing geo-tracking/fencing, et cetera, as well as offering port forwarding on a handful of those if that's something you need. They also include a few concurrent connections without using their client, so you can connect a mobile device as well without needing additional software (this has come in handy while traveling abroad; never know who is recording what off of those hotel wifi points...) For me, the price is more than reasonable for what I'm getting ($25 USD a year, iirc.) Your mileage may vary (obviously) based on your needs.

                                      1 Reply Last reply
                                      0
                                      • M Mike Marynowski

                                        "VPN only offer a leaky protection since it works at IP level" That's the part I'm referring to which was misleading. A properly configured VPN or one that checks for leaky DNS will keep you protected. As per your article: So which VPNs include DNS leak protection? According to BestVPNz.com, Private Internet Access, TorGuard (both of which made it to our best VPNs list), VPNArea, PureVPN, ExpressVPN, VPN.AC, and LiquidVPN all provide protection.

                                        Blog: [Code Index] By Mike Marynowski | Business: Singulink

                                        S Offline
                                        S Offline
                                        Shuqian Ying
                                        wrote on last edited by
                                        #51

                                        Users need external means to patch the holes and it's not 100% sure, aren't they? That's what I meant ...

                                        Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

                                        1 Reply Last reply
                                        0
                                        • M Mike Marynowski

                                          The way you were describing it before you were implying that it is intended that VPNs work that way and all of them work that way, that you *WILL* get leaky protection from a VPN. That's not the case. If that's happening, its a bug or a bad configuration. As the article you linked to states, most of the top VPN providers provide leak detection/prevention already, so a good VPN is a perfectly reasonable way to fully protect yourself.

                                          Blog: [Code Index] By Mike Marynowski | Business: Singulink

                                          S Offline
                                          S Offline
                                          Shuqian Ying
                                          wrote on last edited by
                                          #52

                                          Well, in the world of security, info breach/leak "Could" happen == "risk" :) And there are application scenarios that would favor different VPN connections for different application contexts at the same time, like connecting to different remote offices and browsing at the same time. One needs "Split tunneling" ... This is happening in our ever connecting and distributed online experiences

                                          Find more in 1-NET: connects your resources anywhere[^]. Email searcher Email Aggregation Manager[^].

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups