visit
“Everything popular is wrong”, Oscar Wilde
Definitely, everything popular can be wrong, especially regarding security and privacy tools. Why? The answer is simple. Imagine, that one billion people use daily the one kind of app or tool for storage some kind of important secret data - passwords or crypto private keys.
What will happen in this case? All special forces, hackers and corporations would aim to crack this it, as a reward is enormous. Moreover, if this tool is marketed as something “invulnerable” and truly “not cooperating with governments” their motivation would at least doubled. And it is not surprising — if people have faith at the level of true religion that something is really “truly secure”, they will trust the most important data to this application. And if it would be cracked, the hackers would be silent regarding the fact of a hack. They will let you think that your data is protected controlling every byte you store.
A recently published report regarding the attack revealed that it is possible to infer and hijack VPN-tunneled TCP connections. Using this vulnerability it is possible to identify the fact of VPN connection, the virtual IP address he been assigned and is there an active connection with some website or not. Besides this, it allows an attacker to inject data into the TCP stream and conduct a man-in-the-middle attack. It turns out that the basic VPN protocols like IPSec aren’t secure. It means, that in this case, the military-grade encryption of your VPN would do nothing in regard to making you safer. The most popular VPN services based on OpenVPN also being hacked numerous times, for example[6].
So, what we have? All the popular options aren’t really private and safe. But, in the case of messengers, we almost have no chance to change the situation. The only option we have is to establish some kind of “geek-to-geek approach”, which will work only with friends, that have the same level of craziness around privacy. It will not be convenient to chat with ordinary people.Talking about VPN we have a completely different situation. It is connected with the fact that in messaging apps we are dependent on the net effect (in a nutshell - more friends use the app, the more interesting is to use this app for you). But, in the case of a VPN, we basically don’t have this problem. It doesn’t matter if your friends/business associates use your VPN, other VPN or don’t use a VPN at all. You can be even a single user and it would meet all your current demands in using the Internet. According to this fact, we have two principal options to make our net life safer and private:The first thing that goes through - and what about TOR or I2P? They are open source projects of distributed networks, with good steps obfuscation mechanisms and cryptography. But, TOR is the truly mass-market solution, which attracts an extremely high level of attention from all world special forces. There even are a lot of rumors, that the majority of the network nodes are run by special forces, especially the U.S. ones. Moreover, there was found the fact that exit nodes passing traffic. Besides that, if you try to use TOR as a simple internet-privacy solution you would be disappointed a bit: a lot of everyday websites such as Netflix, Google, and others will ban you from the use or will force you to complete captcha all time. It happens as TOR exit nodes are transparently seen on the Internet and if you are connecting from the TOR exit node you automatically get the red flag. I2P network is traditionally considered as more anonymous than TOR, but you have to pay for it - the speed is really slow. Just check it out. So, these two solutions are workable but complex for everyday use, especially for the average user.
I consider that the following requirements will be enough for open-source solutions to be adopted by the market:
“The concept of VPN will significantly change in 2020”, said , CEO of Cellframe, the security tools provider company. “I think that VPN will be transformed with time to a security middle layer, which will act as a personal spacesuit for any person, who wants to protect personal data, privacy and maintain security level while surfing on the Internet”.So, what dVPNs we have up to date? There are only several solutions, that are in the testnet or mainnet phases of development: , , , , , and . They all are on the early stage of adoption now so it is hard to predict which would be the best one.
The decentralized VPNs look like a holy grail between vulnerable and non-private mass-market security tools and geek-oriented marginalized ones. From the one side, it is an easy-to-use solution for the end-user, and from other - an open-source decentralized network, where the majority of nodes (if the network isn’t attacked) don’t collect logs. The other thing that really matters - from what pieces or “building blocks” these VPNs are built? Any good concept can be ruined by poor implementation. If you use dVPN built from ordinary vulnerable components, your privacy level does not differ significantly from ordinary VPN solution. We selected four main components of any dVPN solution, which have the greatest impact on the safety and privacy of the end-user: VPN client, cryptography (TLS), connection protocol and payment processing.
The first issue we found was payments: the majority of dVPNs not offer really private payments now. Of course, we are not talking about credit cards here or any other forms of fiat payments. But, the ERC20 token offered by almost all projects now definitely isn’t a private tool to exchange value. The core principle of a secure dVPN network is: external observers do not see who pays money as a client and who receives payment for the provision of VPN services as an exit node. The was a first service which offers some kind of private payments using the special mixer to improve anonymity. The other example is , which offers private payments based on quantum-safe ZK-SNARKS. It looks a little bit geeky, but the experience of the end-user isn’t affected: everything happens under the hood. We hope that all dVPN solutions would add private payments as core part of user experience in 2020.
At the moment the industry of dVPNs is in its infancy. Nobody gained at least 1,000 regular users and it is not surprising. It looks that 2020 will be the year of dVPNs, and users will make a choice. The dVPN concept definitely isn’t a holy grail of Internet privacy itself. But, in case of good realization, it can be really the ray of light in the dark. But, it is important to stay away from mass-market privacy elements, which can safely be changed to something more reliable. If the majority of users, concerned about their privacy would migrate to the “brand new” dVPNs built on exactly the same principles as their centralized predecessors it would result exactly as in the example, given at the beginning of the article. A lot of people would use “new VPNs” with a religious feeling about their privacy, while guys from special forces and corporations will check out their activity as before. To be protected from such a situation, we need to check out the stuff we use keeping in mind that everything popular is wrong when we are talking about internet security.
Disclaimer: I have a vested interest in Cellframe, taking the Head of Research position in the company. The dVPN project KELVPN is a subsidiary project of Cellframe.
I do not have any vested interest in any of the other mentioned projects. The views and opinions expressed are those of the author and are not investment advice.
[1]
[2] [3][4][5][6]