Before we get into the latest scary-virtual private network (VPN) news, let’s do as Naked Security’s Paul Ducklin advises and repeat after him:
A VPN doesn’t magically improve security. All it really does is to make your VPN provider into your new ISP – your “first hop” on the internet. That first hop is the one place where a single provider gets to see all your traffic, whether it’s encrypted or not. You need to trust your VPN provider. A lot.
Many people do trust their VPN provider. A lot. Unfortunately, some of them shouldn’t, going by what a Department of Homeland Security (DHS) higher-up recently said.
In a letter sent to Senators Ron Wyden and Marco Rubio on 22 May 2019, Chris Krebs, director of DHS’s Cybersecurity and Infrastructure Security Agency (CISA), wrote that foreign adversaries are interested in exploiting VPN services. From the letter:
Open-source reporting indicates nation-state actors have demonstrated intent and capability to leverage VPN services and vulnerable users for malicious purposes.
Krebs was writing in response to a 7 February 2019 letter sent to him by the senators, who are concerned about threats posed by apps created in countries of national security concern to the US.
The senators noted that mobile browsers such as Yandex, Dolphin and Opera use their own servers as an intermediary for user traffic, compressing the pages before delivering them to users in order to save data. Similarly, VPN providers route traffic through their own servers in order to mitigate privacy concerns – nominally, at least, the senators said.
Using JuiceSSH abroad isn’t as easy as looks so I am going to opt on using VPN. Because I am convinced that my adversaries use VPN’s while being connected to there hacking rigs or raspberry pi hacking networks all over town.
- Launch A DOS Attack By Using Metasploit Auxiliary
- Arduino – LinuxCLI
- Raspberry Pi SSH Using Android
- Kali Linux – Raspberry Pi
- POE Useful In Psychological Warfare
- Networked Love and Hate
- Wireless Radio Frequency Isn’t A Conspiracy Theory
- Directed Energy Attack Map
- Mindware vs Mindwar Technology
If you look at the Jungian mind map and ask yourself is this how we project our consciousness, now if you imagine what that might look like with a cellular radio tower on a much greater level using the same model. Then you get the idea that anyone with a brain could use that tower to troll the whole neighborhood because mind conTROLL.
Made a video for reference purposes regarding anyone with the balls to hack a cellular tower, which can be just about anyone really it doesn’t necessarily mean it’s going to be a government that’s does it.
And Please Folks Do Remember That…….