- Joined
- Dec 9, 2016
I don't trust any of these commercial VPNs. They have a lot of reason to mine your data as they tend to learn the most about who you really are.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Nah, it's fucking excellent if true. This is either propaganda from the dodgy Israeli company that owns PIA, or just this guy talking nonsense.Some weird possibly shit going on with NordVPN.
![]()
How is NordVPN unblocking Disney+?
NordVPN, a company reeling from careless security practices revealed as part of a security breach (one that they covered up for 6 months…medium.com
TL;DR: NordVPN may be using malware from a cousin company to gain illicit access to residential connections for VPN use.
Don't take this as incontrovertible truth, I haven't looked too deep into it, but fucked up if true. Anybody know more?
Nah, it's fucking excellent if true. This is either propaganda from the dodgy Israeli company that owns PIA, or just this guy talking nonsense.
NordVPN specifically denied that their "VPN clients are being used to turn our users into a botnet".
Yeah, I looked into using this for stuff I didn't need to be private with, where the ability to get random residential IPs might be useful.Another Israeli company, Hola, did exactly this, having a peer to peer VPN that used bandwidth from its "free" customers without their knowledge and selling the bandwidth to their paying customers (Luminati).
Still, if what he's saying is true, NordVPN is routing through residential IPs by some shady-ass means, even if they're not DIRECTLY involved compromising those machines, yeah? Possibility 1: He's lying/wrong about the connections being routed through residential. Possibility 2: He's right. Well, how exactly are they routing through residential? Even if NordVPN itself isn't turning VPN connections into nodes (which I don't think he's claiming), SOMETHING is, right?Nah, it's fucking excellent if true. This is either propaganda from the dodgy Israeli company that owns PIA, or just this guy talking nonsense.
NordVPN specifically denied that their "VPN clients are being used to turn our users into a botnet". The article provides not a shred of proof of any such allegations- instead, traffic may be, after going through the regular NordVPN servers, routed through residential internet connections via a service that has nothing to do with NordVPN and especially the VPN clients that users install on their computers.
It's all FUD. Routing traffic through residential IPs is a great way to further decrease the ability for the traditional enemies of the truth to track your internet activity. Now, when will they be offering this for bypassing 4chan blocks?
And? It sounds like NordVPN is giving you a privacy gain, without any downside for the NordVPN user (too bad for the people installing adware).Still, if what he's saying is true, NordVPN is routing through residential IPs by some shady-ass means, even if they're not DIRECTLY involved compromising those machines, yeah? Possibility 1: He's lying/wrong about the connections being routed through residential. Possibility 2: He's right. Well, how exactly are they routing through residential? Even if NordVPN itself isn't turning VPN connections into nodes (which I don't think he's claiming), SOMETHING is, right?
And? It sounds like NordVPN is giving you a privacy gain, without any downside for the NordVPN user (too bad for the people installing adware).
If people install adware on their computers in exchange for some shitty software product, that's fair play.It says something about their integrity. If they'd steal from random people why wouldn't they fuck you over, too?
If people install adware on their computers in exchange for some shitty software product, that's fair play.
It's a different operation.I'm sure they'd have some similar bullshit justification for betraying me, too, so I just won't trust them. If you sign up for them knowing they're thieves and get fucked over, you deserve it, too, by that reasoning.
But that seems like it would require a fair amount of investment and consumer buy in.
Yeah, it definitely doesn't work if you let random anonymous people go through your residential connection to access anything, whether that be the successor of 8chan's /hebe/ under Frederick Brennan's management, or 4chan to post bomb threats, or...It just takes a couple high profile end users going down for someone else's CP downloading for consumer buy in to disappear.
PIA Customer Support said:Thank you for reaching out to us here at PIA Customer Support.
To give you a bit of background: we have recently been acquired by Kape Technologies, a company listed on the London Stock Exchange. CyberGhost had also been acquired by Kape in 2017, so we are now part of the same group.
However, since we are and will remain independent, separate entities, we continue to remain competitors of CyberGhost, even after our acquisition.
And while I am not an expert on CyberGhost VPN, I can tell you that their Privacy Policy refers to their website (signing up, creating an account tied to an email address, purchasing a subscription, and so on.) The personal data they use to guarantee access to their products has nothing to do with their VPN servers.
They also have a strict no-logs policy. You can read more about it here: https://www.cyberghostvpn.com/en_US/no-logs-vpn
What’s more, CyberGhost VPN was the first in the industry ever to publish a Transparency Report. They’ve been keeping this tradition alive ever since 2011, with the newest iteration available here: https://www.cyberghostvpn.com/privacyhub/transparency-report-q2-q3/
I’d also like to add the fact they are legally obligated to inform all users about any change in their privacy policy, the same way we are.
I hope this answers your question, but do not hesitate to contact me if you need more details.
Regards
Fritzi P.
Customer Support Agent
Some weird possibly shit going on with NordVPN.
![]()
How is NordVPN unblocking Disney+?
NordVPN, a company reeling from careless security practices revealed as part of a security breach (one that they covered up for 6 months…medium.com
TL;DR: NordVPN may be using malware from a cousin company to gain illicit access to residential connections for VPN use.
Don't take this as incontrovertible truth, I haven't looked too deep into it, but fucked up if true. Anybody know more?
For still being competitors, that rep sure went to bat for them.Regarding the subject of PIA, here's a little tidbit. I cancelled my subscription last night and gave them my reason, that they've been snatched up by a company responsible for literally creating malware.
Earlier today I get an email reply back from Customer Support. Here's what they had to say:
I did mention CyberGhost in my reasoning, but they didn't seem to address the Crossrider debacle I also mentioned. Not too surprised I guess, but still curious.
Hmm. I can't profess to fully understand this, but there is this:https://www.bleepingcomputer.com/ne...bility-lets-attackers-hijack-vpn-connections/
https://archive.ph/GoizH
New Linux Vulnerability Lets Attackers Hijack VPN Connections
Security researchers found a new vulnerability allowing potential attackers to hijack VPN connections on affected *NIX devices and inject arbitrary data payloads into IPv4 and IPv6 TCP streams.
They disclosed the security flaw tracked as CVE-2019-14899 to distros and the Linux kernel security team, as well as to others impacted such as Systemd, Google, Apple, OpenVPN, and WireGuard.
The vulnerability is known to impact most Linux distributions and Unix-like operating systems including FreeBSD, OpenBSD, macOS, iOS, and Android.
A currently incomplete list of vulnerable operating systems and the init systems they came with is available below, with more to be added once they are tested and found to be affected:
• Ubuntu 19.10 (systemd)
• Fedora (systemd)
• Debian 10.2 (systemd)
• Arch 2019.05 (systemd)
• Manjaro 18.1.1 (systemd)
• Devuan (sysV init)
• MX Linux 19 (Mepis+antiX)
• Void Linux (runit)
• Slackware 14.2 (rc.d)
• Deepin (rc.d)
• FreeBSD (rc.d)
• OpenBSD (rc.d)
All VPN implementations are affected
This security flaw "allows a network adjacent attacker to determine if another user is connected to a VPN, the virtual IP address they have been assigned by the VPN server, and whether or not there is an active connection to a given website," according to William J. Tolley, Beau Kujath, and Jedidiah R. Crandall, Breakpointing Bad researchers at University of New Mexico.
"Additionally, we are able to determine the exact seq and ack numbers by counting encrypted packets and/or examining their size. This allows us to inject data into the TCP stream and hijack connections," the researchers said.
Attacks exploiting CVE-2019-14899 work against OpenVPN, WireGuard, and IKEv2/IPSec, but the researchers are still testing their feasibility against Tor.
They also note that the VPN technology used does not seem to be of importance since the attacks worked during their tests even when the responses they got from targets were encrypted, given that the size of the packets and the number of packets sent was enough to find the type of data packets that were being delivered through the encrypted VPN tunnel.
This attack did not work against any Linux distribution we tested until the release of Ubuntu 19.10, and we noticed that the rp_filter settings were set to “loose” mode. We see that the default settings in sysctl.d/50-default.conf in the systemd repository were changed from “strict” to “loose” mode on November 28, 2018, so distributions using a version of systemd without modified configurations after this date are now vulnerable. Most Linux distributions we tested which use other init systems leave the value as 0, the default for the Linux kernel.
The researchers discovered that most of the Linux distros they tested were vulnerable to attacks exploiting this flaw. They also found that all distros that use systemd versions released after November 28, 2018, that come with Reverse Path filtering switched from Strict mode to Loose mode, are vulnerable.
Given this, all Linux distributions using a systemd version with default configurations after this date are vulnerable.
It's important to note though that, despite some distros with specific systemd versions being vulnerable, the flaw is known to impact a variety of init systems and it is not only related to systemd as shown by the list of affected OSs available above.
Furthermore, network security consultant Noel Kuntze said in a reply to the disclosure report that only route-based VPN implementations are impacted by this vulnerability.
An alleged Amazon Web Services employee also stated that the Amazon Linux distro and AWS VPN products are not affected by attacks exploiting this flaw.
Mitigation is possible
Mitigation is possible according to the researchers and it can be potentially achieved by turning reverse path filtering on, by using bogon filtering —filtering bogus (fake) IP addresses — or with the help of encrypted packet size and timing.
These are the steps needed to run an attack designed to exploit this vulnerability and hijack a target's VPN connection:
1. Determining the VPN client’s virtual IP address
2. Using the virtual IP address to make inferences about active connections
3. Using the encrypted replies to unsolicited packets to determine the sequence and acknowledgment numbers of the active connection to hijack the TCP session
The full procedure to reproduce the vulnerability on Linux distros is explained in detail within the disclosure report publicly available here.
The research team is planning to publish a paper with an in-depth analysis of this vulnerability and its implications but only after finding an adequate workaround.
---- End of Article ----
https://seclists.org/oss-sec/2019/q4/122This attack did not work against any Linux distribution we tested until the release of Ubuntu 19.10, and we noticed that the rp_filter settings were set to “loose” mode. We see that the default settings in sysctl.d/50-default.conf in the systemd repository were changed from “strict” to “loose” mode on November 28, 2018, so distributions using a
version of systemd without modified configurations after this date are now vulnerable. Most Linux distributions we tested which use other init systems leave the value as 0, the default for the Linux kernel...
we recently discovered that the attack also works against IPv6, so turning reverse path filtering on isn't a reasonable solution, but this was how we discovered that the attack worked on Linux.