fortypoundhead.com

How VPN Creates a Secure and Private Tunnel between the Users Device and the Distant Server

Posted On 2014-11-26 by gloriaphilips
Keywords:
Tags: General 
Views: 23280


VPN creates a secure and private tunnel between the user’s device and the distant server which is connected to Internet, thus securing your outgoing and incoming data from interception and snooping. The tool was majorly used by employees to access remotely their company network through a secure channel. Now, this tool can be used by anyone for securing their private network or a coffee shop connection etc.

Privacy Risks:

This complete dependency on another company which is not your ISP could have its privacy risks. A VPN operator can access all the traffic just like your ISP provider when not using the VPN. They could see which sites are accessed and read or modified. Any traffic which is unencrypted can be read by them, or in extreme cases they can even redirect the traffic to malware or phishing sites etc.

Ian Goldberg, a professor and expert cryptographer from the University of Waterloo explains that any VPN system which has not even promised to retain or record data could still be compromised in three ways. They could be prone to lying, get attacked by any third-party or get compelled legally to collect information.

Privacy Policy:

TunnelBear, a VPN service company recently changed its privacy policy. Ryan Dochuk, the co-founder at Tunnelbear explained that they had decided to minimize the size of data collected and make transparent the privacy policy to fully aware their users about which information could be collected and its reason.

Almost all online services collect some form of data from their users. VPN service however is committed to protect a user’s privacy, therefore they are restricted in the information they collect. As a rule VPN services do not log their user’s activities or browsing habits. However there could be many VPN companies that just give access to restricted foreign sports or video streaming websites, and it’s possible that they collect data and track activity.

Keeping Logs for Technical Purposes:

Keeping logs can be important for many reasons to a company. It helps in improving the existing infrastructure of the network. Logs could also help in detection and prevention for fraud. The user’s email id will be stored by most services for subscription purpose and for sending information pertaining to promotions and payment etc.

Keeping little information is helpful not only to the users but also legally secure for the company. If a law enforcement agency asks any VPN service provider for information and data, or a hacker tries to gain access, they would not find anything as there will be no data present.

Unauthorized Data Sharing:

Tunnelbear stores data for operation purposes, like if a user was active this month etc. In internet terms, this data is quite harmless and not a breach of a user’s privacy.

Beyond this, logging could get murky. Some companies store IP addresses, whereas some services share user’s email Ids with marketing agencies or worse provide user statistics.

Future of VPN Services:

Cyberghost VPN claims that they don’t keep any logs or data. In fact they had to conduct anonymous surveys for promotional and marketing reasons as they have no idea about the demographics of their users.

TunnelBear plans to take it further and provide access to their users to all the stored data they have on them. This would be a radical step towards transparency.

About Author:

The article is written and shared by Gloria Philips. She has written many articles related to VPN and internet security. If you are interested in similar discussions, please follow her on Google+.

 

 


About the Author

gloriaphilips has posted a total of 4 articles.

You can find more information from gloriaphilips by visiting http://www.countriesvpn.com/.


Comments On This Post

No comments on this post yet!


Do you have a thought relating to this post? You can post your comment here. If you have an unrelated question, you can use the Q&A section to ask it.

Or you can drop a note to the administrators if you're not sure where you should post.


Your IP address is:54.81.195.240

Before you can post, you need to prove you are human. If you log in, this test goes away.




Recent Forum Posts

Advanced search added
dwirch posted on September 23, 2017 at about 13:44 in Site News

Job Spammer: Gaurav Mehta - AgreeYa Solutions
dwirch posted on September 22, 2017 at about 10:35 in Spammers

Job Spammer: Prutha Siri - Javelin Systems
dwirch posted on September 10, 2017 at about 6:15 in Spammers

New security implemented
dwirch posted on September 7, 2017 at about 7:16 in Site News

Malicious IP Checker Companion Tool
dwirch posted on August 12, 2017 at about 20:24 in Site News

Job Spammer: Steve Adams
dwirch posted on August 8, 2017 at about 7:44 in Spammers