IVPN questions.

Discussion in 'privacy technology' started by Roberteyewhy, Jun 1, 2017.

  1. simmersK00L

    simmersK00L Registered Member

    Joined:
    Mar 20, 2013
    Posts:
    323
    Location:
    USA
    oh! like booz allen hamilton et al. got it. :D
     
  2. Tinstaafl

    Tinstaafl Registered Member

    Joined:
    Jul 30, 2015
    Posts:
    965
    Location:
    USA
  3. simmersK00L

    simmersK00L Registered Member

    Joined:
    Mar 20, 2013
    Posts:
    323
    Location:
    USA
  4. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    Automated attack tools and poor selectors can turn anyone into a "random dude" sadly. The TLAs don't bear the costs, nor are they accountable.
     
  5. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    It could be more common than we realize, given that most people don't know what happened to them :(
     
  6. imdb

    imdb Registered Member

    Joined:
    Nov 2, 2011
    Posts:
    4,208
    you mean about the same number of people who are windows users also? :ninja:
     
  7. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Probably. But more like 90% of everybody but Linux and *BSD users (because maybe there are fewer exploits for those systems).
     
  8. imdb

    imdb Registered Member

    Joined:
    Nov 2, 2011
    Posts:
    4,208
    don't know if posted before but here's what mr schneier's got to say:
    https://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance

     
  9. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    That's good advice. But maybe what's changed since 2013 is #3. NSA has automated a lot since then, I gather :(
     
  10. Tinstaafl

    Tinstaafl Registered Member

    Joined:
    Jul 30, 2015
    Posts:
    965
    Location:
    USA
    #4. Be suspicious of commercial encryption software, especially from large vendors.

    Here's another blog post from Bruce Schneier where he admits bailing on TrueCrypt for Microsoft BitLocker.

    https://www.schneier.com/blog/archives/2015/06/encrypting_wind.html

    He also mentions that he agrees with another writer's conclusion: "If it ever turns out that Microsoft is willing to include a backdoor in a major feature of Windows, then we have much bigger problems than the choice of disk encryption software anyway."
     
  11. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Me, I think that we have some pretty big problems ;)
     
  12. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402

    The one I have never read about being broken into "at rest" is a LUKS header. Assuming it was placed on the disk by someone who knows what they are doing with an appropriate password. Regardless though; LUKS, TC, VC, or BitLocker (even if solid) can be ONLY protect you while the disk is at rest. I will bank my "chips" on LUKS vs all the others I mentioned.
     
  13. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Yes, as long as they hadn't already obtained the key from RAM ;)
     
  14. Roberteyewhy

    Roberteyewhy Registered Member

    Joined:
    Mar 4, 2007
    Posts:
    610
    Location:
    US
    IVPN working well. Just so fast to anywhere even in Multi-Hop. Well worth the $100 yearly. Just waiting for the Android app instead of OpenVPN as iPhone app has been released.
     
  15. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.