Author: WhoVPN

  • The Art of Invisibility: Why Self-Control is the Key to True Anonymity

    The Art of Invisibility: Why Self-Control is the Key to True Anonymity

    In the realm of information security (infosec), network security (netsec), and operational security (opsec), achieving true anonymity and security in the digital world demands a level of self-discipline and strategic compartmentalization that is strikingly mirrored in Arya Stark’s journey in the popular television series “Game of Thrones.” Arya’s transformation into a faceless, anonymous member of the Faceless Men, a group of skilled assassins, is not just a narrative of personal evolution but also a metaphor for the meticulous and disciplined approach required in the world of digital security.

    Compartmentalization and Identity Shedding

    Much like Arya learns to detach herself from her past and identity, effective compartmentalization in digital security involves a similar detachment from one’s personal identity. Utilizing separate virtual machines (VMs) for different personas, akin to Arya adopting different faces for different purposes, is crucial. Each VM must act as a distinct, unconnected entity, mirroring how each new identity Arya assumes is independent of the others.

    Each VM should serve a specific purpose, much like the different faces Arya adopts for her missions. For example, one might use a distinct VM for personal communications, another for professional work, and yet another for sensitive research or activism. This approach ensures that activities and data in one area do not intermingle or compromise the security of another.

    To enhance the effectiveness of these VMs, it’s essential to tailor their security settings according to their specific uses. A VM designated for sensitive activities should be fortified with stronger encryption and more stringent privacy controls compared to one used for general browsing. Regular updates and maintenance of each VM are also crucial, paralleling Arya’s constant honing of her skills and adaptability. These steps help protect against vulnerabilities and maintain the integrity of each digital persona. Furthermore, the storage of data relevant to each persona should be confined to its respective VM, using robust encryption methods to secure this information. This not only maintains the integrity of each persona but also reduces the risk of data compromise in the event of a VM breach.

    Incorporating tools like Tor and VPNs within VMs, especially those used for sensitive activities, adds an additional layer of anonymity and security, akin to Arya’s use of disguises and stealth tactics in her assignments. Lastly, having contingency plans for each VM is vital. These could include secure data deletion methods or quick shutdown processes, reflecting Arya’s preparedness to abandon an identity if it becomes compromised. Such comprehensive measures in the use of VMs embody the essence of maintaining digital anonymity, drawing a parallel to Arya Stark’s disciplined journey of becoming a faceless entity in a complex and perilous landscape.

    Conscious Avoidance of Personal Traces

    A key aspect of Arya’s training is learning not to leave any trace of her original identity. In the digital world, this translates to consciously avoiding personal searches on work computers and not mixing personal information in professional contexts. It’s about ensuring that digital traces do not inadvertently link back to one’s true identity.

    Selective Sharing and Trust

    Arya’s journey teaches her not to share her true self with anyone outside her trusted circle. This principle is vital in operational security. It involves not discussing sensitive topics with family or friends who are not part of the same secure network. Being selective with trust and information sharing is essential, much like the caution Arya exercises in her interactions.

    Adhering to Strict Boundaries

    The principle of “Don’t Shit Where You Eat” in opsec parallels Arya’s disciplined approach to her training and missions. She learns to separate her personal emotions and attachments from her tasks. Similarly, maintaining strict boundaries between different aspects of one’s life, both online and offline, is fundamental in preserving anonymity and security.

    The Importance of Self-Discipline

    True anonymity extends beyond using the proper tools and encrypted systems. It requires a steadfast commitment to keeping personas and activities isolated at all times. This includes using separate devices and accounts for each persona, never mixing them, and isolating oneself from personal connections to prevent accidental leaks of sensitive information. Furthermore, utilizing encrypted operating systems like Whonix or Tails for anonymous browsing, and routing all traffic through Tor with a persistent entry guard, are crucial steps for best anonymity practices. While browsers like Firefox or Brave offer some privacy protections, full anonymity demands further compartmentalization via virtual machines and encrypted operating systems. VPNs, though useful, are not sufficient alone for anonymity, as they still reveal your real IP to the VPN provider. They should be used in conjunction with, not as a substitute for, Tor.

    In emulating Arya Stark’s meticulous approach to anonymity in “Game of Thrones,” the application of Specific, Measurable, Actionable, Relevant, and Time-bound (SMART) goals is essential in the conscious avoidance of personal traces in the digital realm.

    Specific Goals

    1. Device Segregation: Allocate specific devices for distinct purposes – one for personal use, another for professional tasks, and perhaps a third for sensitive research or activities.

    Measurable Actions

    1. Audit Frequency: Set a bi-weekly or monthly schedule to review and audit your digital footprint across all devices and accounts, ensuring no overlap between personal and professional identities.

    Actionable Steps

    1. Browser Hygiene: Establish a routine of using different browsers or browser profiles for various activities. Ensure clearing of cookies and cache after each session.

    Relevant Behaviors

    1. Education and Awareness: Regularly update yourself with the latest in digital privacy and security, ensuring that your practices are aligned with current standards and threats.

    Time-bound Plans

    1. Quarterly Reviews: Implement a quarterly review process to assess the effectiveness of your anonymity strategies, making adjustments as necessary based on the latest technological advancements and personal or professional changes.

    Closing Thoughts

    In summary, the journey of Arya Stark in “Game of Thrones” offers a compelling metaphor for the stringent discipline required to maintain anonymity and security in the realm of information and network security. The quest for digital invisibility mirrors Arya’s transformative process, necessitating a steadfast commitment to detachment, prudent sharing of information, and meticulous compartmentalization of various aspects of one’s life. By adhering to these principles and following the guidelines outlined for managing virtual machines and digital identities, you equip yourself to navigate the complex and often treacherous landscape of digital security effectively. With such a disciplined approach, when faced with a figurative Jaqen H’ghar asking “Who are you?” in the digital world, you’ll be able to confidently respond, “No one,” reflecting your successful embodiment of true digital anonymity.

  • Bahrain

    The small island nation of Bahrain, ruled by the Al Khalifa family since 1783, presents a complex picture of modern struggles amidst ancient divisions. Once hailed as a model for reform in the Gulf, the brutal government crackdown on 2011’s Arab Spring protests has left the country fractured along sectarian lines. The monarchy’s dependence on external support from regional allies has led to an increasingly authoritarian stance aimed at preserving stability, while stifling dissent.

    The Challenges of Speaking Freely

    Freedom of expression is severely curtailed in Bahrain, with the government utilizing a mix of laws, surveillance, and censorship to silence critics. Independent media outlets have been banned since 2017, and the 2016 Press Freedom Index ranked Bahrain 162nd out of 180 countries.[14] Vague legal language criminalizing speech deemed offensive to the regime or national unity gives authorities broad powers for prosecution. Over 1,000 websites have been blocked, including human rights sites and opposition blogs.[6] Fear of reprisals leads many to self-censor when speaking online or to the media.

    The crackdown intensified after the 2011 protests, when activists utilized social media and international press coverage to organize and share their pro-democracy message globally. Angered by this free flow of information, officials resolved to prevent it from happening again.[10] A cybercrime law passed in 2014 facilitates the monitoring of all online activity, with the Telecommunications Regulatory Authority filtering content and requiring internet service providers to utilize its censorship system.[8]

    Downloading in the Dark

    While strictly controlled traditional media leaves little room for free expression, the internet has provided an outlet for sharing information. However, downloading copyrighted material through peer-to-peer (P2P) software or torrent trackers also opens up users to potential legal penalties. Still, some in Bahrain argue that individuals face little risk of prosecution for personal piracy, unlike companies or commercial operations.[3]

    Nonetheless, the government blocks torrent sites freely, and may punish those visiting them, citing piracy as detrimental to national interests or religious morality. Circumventing these restrictions carries the same risks as other “subversive” online activities. Some users have adapted by learning to navigate access points beyond the reach of censors.[8] But for most, the dangers outweigh any benefits.

    An Intrusive State Apparatus

    Advanced surveillance technology acquired from international sources has given Bahraini security services immense powers to monitor its citizenry through online and telephonic communication.[4] The government captures IP addresses to identify, track, and arrest bloggers and internet users for posts deemed inappropriate – over 15 journalists have fled into exile. [8] Fear of constant monitoring permeates Bahraini society, stymying dissent.

    The opposition utilizes VPNs and secure chat apps to avoid detection, but state hackers have grown adept at infiltrating such channels.[8] For political opponents and human rights activists, simply communicating safely has become an ordeal, let alone organizing more publicly. The expansion of Chinese-style technological authoritarianism further empowers the regime.

    While Bahrain presents a gleaming modern face to the world, its campaign against online freedoms reveals the insecurity plaguing its rulers. However, no matter how tightly information is controlled, the desire for self-expression cannot be easily suppressed. The struggle for rights continues, albeit more discreetly, but with no less conviction.

    Citations:
    [1] https://manaramagazine.org/2022/10/bahrain-tribalism-sectarianism-and-the-challenges-of-the-21st-century/
    [2] https://www.hrw.org/report/2022/10/31/you-cant-call-bahrain-democracy/bahrains-political-isolation-laws
    [3] https://www.reddit.com/r/Bahrain/comments/169d49q/torrents/
    [4] https://www.theguardian.com/news/2022/feb/18/how-spyware-erodes-human-rights-in-bahrain-nso-group-pegasus-project
    [5] https://bti-project.org/en/reports/country-report/BHR
    [6] https://en.wikipedia.org/wiki/Censorship_in_Bahrain
    [7] https://vpnpro.com/best-vpn-services/bahrain-vpn/
    [8] https://giswatch.org/en/country-report/communications-surveillance/bahrain
    [9] https://www.bqa.gov.bh/en/aboutqaaet/pages/4thgeneration.aspx
    [10] https://freedomhouse.org/country/bahrain/freedom-net/2022
    [11] https://www.safetydetectives.com/blog/how-to-get-a-bahrain-ip-address/
    [12] https://freedomhouse.org/country/bahrain/freedom-net/2021
    [13] https://citeseerx.ist.psu.edu/document?doi=08a866192fbd24b6b2b0c13de4fb01864fbdf432&repid=rep1&type=pdf
    [14] https://rsf.org/en/country/bahrain
    [15] https://support.purevpn.com/about-purevpn/p2p-file-sharing
    [16] https://www.mdpi.com/2073-4441/11/4/682
    [17] https://freedomhouse.org/country/bahrain/freedom-world/2022
    [18] https://www.sonicwall.com/support/knowledge-base/how-to-block-p2p-applications-eg-bittorrent-emule-using-application-control-policies/170503412433395
    [19] https://vc.bridgew.edu/jiws/vol13/iss5/3/
    [20] https://www.state.gov/reports/2022-country-reports-on-human-rights-practices/bahrain/
    [21] https://www.vpnranks.com/countries/bahrain/
    [22] https://www.jstor.org/stable/10.3366/jj.1011777
    [23] https://www.hrw.org/world-report/2023/country-chapters/bahrain
    [24] https://limevpn.com/what-countries-are-the-safest-for-torrenting-the-ultimate-truth/
    [25] https://www.adhrb.org/2021/10/bahrains-repression-of-online-dissent-an-egregious-violation-of-freedom-of-expression/

  • SoftLayer Technologies Inc.

    AS36351 is an Autonomous System Number (ASN) assigned to SoftLayer Technologies Inc., a company that provides cloud computing infrastructure[1][18]. ASNs are unique identifiers assigned to entities such as Internet Service Providers (ISPs) and other large organizations that control blocks of IP addresses[5].

    SoftLayer Technologies Inc., now an IBM company, offers a range of services including cloud servers, storage, and networking. They also provide services related to security, analytics, and mobile, among others[11].

    In relation to the VPN industry, SoftLayer’s infrastructure is often used by VPN providers. VPNs, or Virtual Private Networks, are services that allow users to connect to the internet via an encrypted tunnel, which enhances privacy and security. Some IP addresses associated with SoftLayer have been identified as VPN connections[2][7].

    However, SoftLayer has faced some controversies. In 2015, it was criticized for allegedly hosting spam activities. Despite several complaints, SoftLayer and IBM were accused of refusing to suspend the spammers[3]. Additionally, some sources suggest that ASNs like AS36351 could be used by automated botnets, potentially leading to security concerns[16].

    In summary, AS36351 is a significant player in the internet infrastructure landscape, providing the backbone for various online services, including VPNs. However, like many large tech entities, it has faced its share of controversies and challenges, particularly related to spam and security issues.

    Citations:
    [1] https://bgp.he.net/AS36351
    [2] https://us.ipqualityscore.com/free-ip-lookup-proxy-vpn-test/lookup/108.168.239.90
    [3] https://krebsonsecurity.com/2015/10/ibm-runs-worlds-worst-spam-hosting-isp/
    [4] https://www.whatismyip.com/asn/36351/169.56.0.0/18/
    [5] https://ipinfo.io/AS36351
    [6] https://dl.acm.org/doi/pdf/10.1145/3278532.3278570
    [7] https://www.ipqualityscore.com/free-ip-lookup-proxy-vpn-test/lookup/169.62.89.11
    [8] https://www.ipqualityscore.com/asn-details/AS36351/softlayer-technologies-inc
    [9] https://www.arista.com/en/um-eos/eos-bgpmpls-l3-vpn
    [10] https://forum.avast.com/index.php?topic=148510.0
    [11] https://www.peeringdb.com/asn/36351
    [12] https://mailman.nanog.org/pipermail/nanog/2018-September/097221.html
    [13] https://www.ip2location.com/as36351
    [14] https://security.stackexchange.com/questions/12792/block-all-botnets-and-tor-addresses-from-accessing-our-site
    [15] https://www.bigdatacloud.com/asn-lookup/AS36351
    [16] https://github.com/LorenzoSapora/bad-asn-list
    [17] https://cleantalk.org/blacklists/as36351
    [18] https://www.whatismyip.com/asn/36351/

  • Gigabit Hosting

    AS55720 is an autonomous system number assigned to the company Gigabit Hosting Sdn Bhd, which seems to be a Malaysia-based hosting provider. Autonomous system numbers like AS55720 are used to identify networks on the internet and route traffic between them.

    From what I could dig up, AS55720 is a relatively small network focused on hosting services. They don’t seem to be a major player in the VPN industry specifically. The ASN was assigned to them fairly recently, in 2020.

    I wasn’t able to find much info on their specific services or products. Their website is just a basic landing page. Hosting and domain registration services seem to be their bread and butter.

    There’s no evidence of major controversies or security issues related to AS55720. They aren’t mentioned in any cybersecurity threat reports that I came across. As a small hosting provider, they probably fly under the radar compared to bigger players.

    In summary, AS55720 represents a Malaysia-based company offering standard hosting services. They don’t have a big footprint in the VPN world or much visibility in general. Just a run-of-the-mill hosting provider trying to make their way on the internet!

  • Datacamp Limited

    Autonomous System Number (ASN) 60068 is assigned to a company called Datacamp Limited based in the United Kingdom. ASNs are unique identifiers assigned to organizations that control blocks of IP addresses.

    Datacamp operates a content delivery network (CDN) and provides dedicated servers and advanced network monitoring. They seem to be a major player in the CDN and hosting space.

    The ASN was originally assigned to Datacamp on June 4, 2014. Since then, it has been associated with over 6.5 billion IP addresses according to IPQualityScore[9].

    AS60068 is frequently linked to VPN services and proxy networks. IP addresses in this ASN are often flagged by services like IPQualityScore as high risk or potential VPN connections[6][10]. This makes sense given Datacamp’s CDN and hosting businesses.

    Some controversies and issues surrounding AS60068:

    • In 2019, the ASN was banned by Grindr for violating their terms of service.[3]
    • In 2020, users of Artix games received error messages saying AS60068 was banned, blocking access.
    • Research papers have scrutinized the VPN ecosystem associated with AS60068 and other ASNs operated by hosting companies[17].

    So in summary, AS60068 is a major CDN and hosting provider that controls a huge number of IP addresses. It has strong links to VPN services, which has caused some services to ban the ASN for terms of service violations. But overall AS60068 seems to be a big player in the hosting and network infrastructure space.

  • GleSYS AB

    GleSYS AB, associated with ASN 42708, is a prominent company in the field of Cloud and IT Infrastructure as a Service, offering a range of services including public cloud services, hosting, VPN, and more. Founded in 1999, GleSYS is headquartered in Falkenberg, Sweden, and operates three data centers in Falkenberg, Stockholm, and Oulu, as well as offering cloud services in Oslo, Amsterdam, and London. The company also functions as an Internet Service Provider (ISP) through an extensive European fiber network​.

    GleSYS AB’s Autonomous System Number (ASN) 42708 has a significant presence with 81,016 hosted domains and a substantial number of IP addresses, comprising 147,200 IPv4 and an enormous 2,297,625,175,394,403,092,616,997,502,976 IPv6 addresses. This ASN has been allocated since April 4, 2007, and is registered under the RIPE network coordination center.

    In terms of certifications and standards, GleSYS AB adheres to ISO 9001:2015, ISO 14001:2015, and ISO/IEC 27001:2013, indicating a commitment to quality management, environmental management, and information security management respectively​​.

    Regarding mergers and acquisitions, GleSYS has acquired one company in the last five years, focusing primarily on the communications sector. A notable acquisition includes Stockholm Internet eXchange AB in April 2020​​​​.

  • Hivelocity

    ASN 29802 is associated with Hivelocity, Inc., a significant entity in the web hosting and cloud services industry[1][6]. Hivelocity provides a range of services, including dedicated servers, cloud hosting, and colocation, among others. It is based in the United States and peers with numerous other Internet Service Providers (ISPs)[12][17].

    In relation to the VPN industry, ASN 29802 has a connection through NordVPN, one of the top VPNs in the market[2]. Another VPN service, ExpressVPN, has also been associated with this ASN[9]. These VPN services use Hivelocity’s infrastructure for their operations.

    However, ASN 29802 has been linked to some controversies. It was found to be responsible for more than 50 percent of blog spam, with over 30,000 spam posts during a two-week interval[13]. This has led to some IP addresses associated with ASN 29802 being reported as spam[14]. There have also been instances where users have been denied access to certain websites, possibly due to the association of ASN 29802 with spam activities[15].

    In summary, while ASN 29802, or Hivelocity, plays a significant role in the web hosting and VPN industries, it has also been associated with some negative activities, such as spamming. This highlights the dual nature of such entities in the digital world, where they can provide essential services but also be linked to less desirable activities.

    Citations:
    [1] https://bgp.he.net/AS29802
    [2] https://whoisyourvpn.com/asn/
    [3] https://www.webhostingtalk.com/showthread.php?t=713833
    [4] https://www.whatismyip.com/asn/29802/96.31.91.0/24/
    [5] https://www.ip2location.com/as29802
    [6] https://whoisyourvpn.com/asn/29802/
    [7] https://www.ipqualityscore.com/free-ip-lookup-proxy-vpn-test/lookup/198.178.127.163
    [8] https://www.peeringdb.com/asn/29802
    [9] https://www.ipqualityscore.com/free-ip-lookup-proxy-vpn-test/lookup/193.56.117.58
    [10] https://www.robtex.com/as/AS29802.html
    [11] https://ipinfo.io/AS29802
    [12] https://bgpview.io/asn/29802
    [13] https://openaccess.city.ac.uk/8210/1/blog-spam-oct2010.pdf
    [14] https://cleantalk.org/blacklists/as29802
    [15] https://www.reddit.com/r/Crunchyroll/comments/89oygu/help_error_1005_access_denied/
    [16] https://whois.ipip.net/AS29802
    [17] https://bgp.tools/as/29802
    [18] https://www.datacentermap.com/as/29802/

  • TEFINCOM S.A.

    TEFINCOM S.A., a company registered in Cyprus, plays a significant role in the VPN industry. It was established on January 16, 2018, and is headquartered in Egkomi, Nicosia, Cyprus​​​​. The company’s most notable association with the VPN industry is through NordVPN, one of the top VPNs in the market. Initially, NordVPN was owned by Tefincom S.A. until November 2020. Following structural changes, NordVPN was rebranded under the entity known as Nord Security​.

    Quick Stats

    Total Servers

    731

    Countries

    United States, Romania, South Korea, Greece, Mexico, Germany, Spain, Sweden, South Africa, Colombia, Netherlands, Australia, Hong Kong, France, Croatia, Luxembourg, Ireland, Switzerland, Poland, Chile

    Unique VPNs

    3

    Cities

    30

    (see all)

    Dallas, Bucharest, Seoul, Athens, Mexico City, San Jose, Atlanta, Frankfurt am Main, Madrid, Stockholm, Johannesburg, Bogota, Los Angeles, Amsterdam, Sydney, Central, Hong Kong, Marseille, Zagreb, Luxembourg, Cruchten, Dublin, Zurich, Paris, New York, New York City, Warsaw, Santiago, Ashburn, Miami

    Unique IPs

    731

    The development of NordVPN, a leading VPN service, was supported by Nord Security (Nordsec Ltd), a company specializing in cybersecurity software. Nord Security was initially backed by the Lithuanian startup accelerator and business incubator Tesonet​​. NordVPN itself was established in 2012 by a group of childhood friends, including Tomas Okmanas. The service has expanded significantly since its inception, offering applications across various platforms and operating 5,600 servers in 59 countries as of June 2021​.

    TEFINCOM S.A.’s connection to the VPN industry, particularly through NordVPN and its subsequent evolution into Nord Security, highlights the company’s influence and presence in this sector. This relationship underscores the importance of structural and branding strategies in the tech industry, especially for companies like TEFINCOM S.A. that are associated with high-demand digital services like VPNs.

  • Serverfield Co., Ltd.

    Serverfield Co., Ltd., designated with Autonomous System Number (ASN) 134094, is a company based in Taiwan, specifically located at 268 Junfu 11th Rd., Beitun, Taichung​​​​. The ASN 134094 was assigned to Serverfield Co., Ltd. by the Asia-Pacific Network Information Centre (APNIC) on March 9, 2015​​.

    Quick Stats

    Total Servers

    4

    Countries

    Turkey

    Unique VPNs

    1

    Cities

    Istanbul

    Unique IPs

    4