Tag: tzulo

  • Kaspersky

    Kaspersky

    In the labyrinthine world of cybersecurity, Kaspersky Lab has carved out a name for itself as a leading antivirus and security software provider. Founded in 1997 and headquartered in Moscow, the company has had its share of accolades and controversies. Kaspersky gained significant recognition for its role in uncovering state-sponsored cyber-attacks, including the Stuxnet worm that targeted Iranian nuclear facilities. However, the company has also faced scrutiny, most notably in 2017 when the U.S. government banned federal agencies from using Kaspersky software over concerns that the Russian government could exploit its access to U.S. systems. Amid this backdrop, Kaspersky offers a Virtual Private Network (VPN) service, adding another layer to its cybersecurity portfolio. Intriguingly, the VPN infrastructure is managed by Pango Group, which is owned by the conglomerate Aura. This relationship raises questions about Kaspersky VPN’s commitment to privacy, given that multiple entities are involved in data processing and management. In this article, we’ll explore the details of Kaspersky’s VPN service, examining its features, privacy policies, and the implications of its association with Pango and Aura.

    App Privacy

    Our analysis of the app’s network connections reveals some intriguing insights. While Kaspersky does maintain connections that are integral to its core security functions—such as touch.kaspersky.com and edge.geo.kaspersky.com—the story doesn’t end there. The app engages with an assortment of analytics and tracking services, including various appsflyersdk.com subdomains, firebaselogging-pa.googleapis.com, and app-measurement.com. This paints a picture of an app that’s not just focused on security but also has its fingers in the analytics and tracking jar. Adding another layer of complexity, Kaspersky employs a multitude of unique subdomains related to its own services, raising questions about the necessity of such intricacy. For the privacy-conscious user, these details cast a shadow on Kaspersky’s otherwise reputable image, ultimately placing it in the “D” category of our privacy rating scale. So, while Kaspersky may offer robust security features, those looking for an equally strong commitment to privacy might want to tread carefully.

    Terms of Use

    In the digital age, scrutinizing the Terms of Use of any software solution is crucial for maintaining one’s privacy and security. Kaspersky’s Software solution, according to its Terms of Use, collects an extensive array of user data ranging from email addresses and unique IDs to sensitive financial information and device-specific details. While some data collection is necessary for the software’s core functionalities like managing licenses and remote control of security levels, the breadth and variety of data being collected raise questions for privacy-conscious users. Notably, the terms also mention that using external authentication providers subjects your data to another set of policies, adding another layer to consider in terms of data security.

    Adding to the complexity, the software operates under the legislation of the Russian Federation, which could entail different data protection standards than those you may be accustomed to. The terms also prohibit users from independently assessing the software’s security, limiting your ability to gauge its robustness. While Kaspersky is a respected name in the cybersecurity world, the extent of data collection and other stipulations in their Terms of Use necessitate a thorough evaluation, especially if you prioritize privacy and data security. Always remember, the devil is in the details—or in this case, the fine print.

    Privacy Policy

    Kaspersky’s Privacy Policy further expands on how user data is collected and processed, with specific attention to marketing and VPN functionalities. The policy points out that some statistics are used explicitly for marketing purposes, aiming to improve the quality of the application and offer targeted security solutions. While the policy does specify that the collected data cannot be linked to your online activity, it introduces Adaptive Security technology for Android, which ‘normalizes’ website and app information by deleting all personal data before checking against Kaspersky’s reputation cloud database. It’s worth noting that while the Terms of Use prohibits users from independently assessing the software’s security, the Privacy Policy emphasizes that they adhere to “the highest data protection standards.”

    Interestingly, the policy explicitly states that your online activity is not logged and that data is never used for advertising. This is in line with the Terms of Use, which also does not mention any third-party advertising. However, one point to consider is the involvement of Pango as the VPN service provider. While Kaspersky processes data required for the application to function, Pango processes data needed to arrange VPN sessions. Despite the division of labor, both companies claim not to log online activity. The Privacy Policy could be clearer on how Pango aligns with Kaspersky’s data protection standards, especially given that VPNs are often used specifically for enhanced privacy and security. As always, understanding the full scope of data collection and usage requires vigilance and a careful read of both the Terms of Use and Privacy Policy.

    See also:

  • Mullvad

    Mullvad

    Mullvad is a small but mighty VPN provider that offers incredible speeds along with security and performance that stacks up with the best VPNs. Mullvad VPN is fast, great for torrenting, and excellent at keeping you safe online. It uses AES-256 encryption, OpenVPN and WireGuard protocols, multi-hop, and a dependable kill switch. However, Mullvad prioritizes internet privacy over entertainment. Despite its excellent privacy and security offering, the VPN is terrible when it comes to unblocking streaming services.

    But when you are using Mullvad VPN, who’s networks are you really using? After my testing I concluded that Mullvad uses 48% M247, 15% 31173, 11% Tzulo, 8% DataPacket, 7% 100TB, 3% xTom, and the remaining servers use Blix, QuadraNet, and Intergrid.

    Looking at the chart above, you can see that Mullvad VPN has effectively surrendered a significant degree of control over their VPN network to the British authorities. This means that M247 and DataPacket may be required by the courts to monitor, censor, or eliminate certain nodes. The UK is notorious for mandating that internet service providers keep records of every website visited by a user for a year. Furthermore, the country has proposed that social media and ISPs block posts containing “legal but harmful content.” Additionally, the so-called independent regulator Ofcom, which is not truly independent, has the power to censor anything it deems to be misinformation or disinformation, much like China and Russia.

    Either the government or Ofcom could easily categorize M247 and DataPacket as ISPs, rather than web hosts. This would result in the enforcement of censorship on their global networks or a 10% global turnover fine. M247 provides internet services to UK-based businesses, making it an obvious candidate for ISP classification. DataPacket, on the other hand, could potentially be classified as offering an internet service due to their active advertising to VPN providers, although this is a weaker argument.

    App Privacy

    Other Security Features

    • Kill Switch â€” A kill switch acts as your last line of defense when your VPN connection unexpectedly drops. Mullvad has a built-in kill switch that can never be disabled, but it’s only available on its desktop apps. I tested it by trying to load a page when changing servers on my laptop, and it said my connection was cut off.
    • Split Tunneling â€” Split tunneling allows you to use your VPN connection and local network at the same time. The advantage is that you can use local apps while bypassing geoblocks on your browser. Mullvad only enables split tunneling on its Android and Linux apps, and are currently building a Windows version. When I tried it on my Android smartphone, I could use my local banking app while watching US Netflix through the encrypted VPN tunnel. If you’re not using Android or Linux, then you can configure your routes on your OpenVPN or WireGuard protocol to enable split tunneling.
    • Double VPN â€” Mullvad’s Bridge servers are a version of Double VPN or MultiHop. This is when your internet traffic gets redirected through 2 VPN servers instead of just 1 for extra security. It can also help you bypass firewalls on restricted networks. You can easily toggle Bridge on or off in settings. I was impressed that I didn’t notice any decrease in speed when I used them — usually, the extra encryption layers reduce your speeds. However, you can’t use Bridge servers on mobile devices, which was disappointing.
    • Tor compatibility â€” You can configure your OpenVPN connection to use the Tor network through Mullvad. Once the configuration is done, then you’ll need to configure your Tor browser to connect to Mullvad using the Shadowsocks proxy. This means that you can only connect to the Tor network through the Tor browser by using Mullvad as the exit node. Luckily, there are instructions available for this.

  • Hotspot Shield

    Hotspot Shield

    Hotspot Shield

    Hotspot Shield is a VPN service that has been around since 2008, making it one of the older players in the market. The service gained notoriety for its use by dissidents during the Arab Spring protests in the early 2010s. However, its reputation took a hit in 2016 when researchers cited Hotspot Shield in a research paper for using tracking libraries in their VPN service. A year later, the Center for Democracy and Technology accused the company of engaging in unfair and deceptive trade practices. In 2018, a researcher discovered a data leak, further eroding Hotspot Shield’s reputation. As a result, many websites stopped recommending the service.

    Despite these negative events, Hotspot Shield got a fresh start in 2019 when it became part of the Pango family of products. The VPN service was then acquired by a company called Aura in July 2020. With these recent changes in ownership, we felt it was a good time to take another look at Hotspot Shield. During our research and testing, we identified both positives and negatives of the service, and we also uncovered some interesting facts about Hotspot Shield and its parent companies. While we will delve into the corporate complexities at a later time, our findings provide a comprehensive overview of Hotspot Shield and its suitability as a VPN provider.

    Baked with adware

    Similar to VPN 360, the Hotspot Shield app routinely pings multiple advertising domains which is immediately a red flag. Any company that injects tracking codes into their apps immediately lose credibility in my eyes, and I take all of their promises and core principles with a grain of salt. I also discovered the app pinging various subdomains from yahoo.com There are much, much better VPNs that fight to protect your privacy – for less money. Here are the most commonly accessed domains from the app:

    • adcolony.com
    • adtilt.com
    • unity3d.com
    • doubleclick.net
    • supersonicads.com
    • dewrain.life
    • ssacdn.com
    A complicated history

    The corporate structure of Hotspot Shield is complex, and it has undergone significant changes over the years. The VPN service was developed by AnchorFree in 2008, a company based in Redwood City, California. Despite being a popular VPN service, Hotspot Shield faced a setback in 2017 when the Center for Democracy and Technology accused AnchorFree of deceptive trade practices. In 2018, a security researcher discovered a bug in the Hotspot Shield client that exposed user data.

    In 2019, Hotspot Shield joined Pango, a new company that offers a suite of security and privacy products. Like AnchorFree, Pango is based in Redwood City, California.

    In July 2020, Pango joined Aura, a digital security company. According to Hari Ravichandran, the founder, and CEO of Aura, the goal of all this activity is to:

    …build the best all-in-one digital protection platform for consumers. With the scale achieved through these transactions, we continue our journey to build and expand our integrated security platform. Our vision is fueled by our commitment to make digital security simple, user-friendly and accessible to everyone.

    Shady logging practices

    Sure enough, when I clicked on the VPN’s privacy policy on its website, I was redirected to Aura’s general policy for all of its products. While Hotspot Shield claims it doesn’t store any information that can be linked back to you, Aura states it logs the following:

    • Information about the domains you access when connected.
    • Usage information such as connection timestamps, frequency of use, and bandwidth used.
    • Device information including identifiers, operating systems, browser type, internet service provider, and network information.
    • Approximate location information (obtained from logging your IP address, albeit encrypted).
    Related Posts
  • VPN 360

    VPN 360

    VPN 360 is a virtual private network (VPN) app that allows users to protect their online privacy and security by encrypting their internet connection and routing it through a private server. It is one of the security products offered by Pangu whose parent company is Aura. VPN 360 is available for both Android and iOS devices, and can be downloaded for free from the Google Play Store or the Apple App Store. VPN 360 offers both free and paid subscription options. The free version of the app has some limitations, such as slower connection speeds and a limited selection of servers. The paid subscription offers faster connection speeds, more server locations, and other additional features.

    Our first major problem with VPN 360, and it’s all because of their logging policy. Their so-called “privacy policy” clearly states that they’ll hand over your information to the authorities without hesitation, and there are a ton of exceptions where they’ll collect and give up your data. Honestly, we find this policy completely unacceptable and we wouldn’t recommend trusting it, especially since VPN 360 is a paid service.

    Tracking code

    Similar to Hotspot Shield, the VPN 360 app routinely pings multiple advertising domains which is immediately a red flag. Any company that injects tracking codes into their apps immediately lose credibility in my eyes, and I take all of their promises and core principles with a grain of salt. I also discovered the app pinging various subdomains from yahoo.com There are much, much better VPNs that fight to protect your privacy – for less money. Here are the most commonly accessed domains from the app:

    • adcolony.com
    • adtilt.com
    • unity3d.com
    • doubleclick.net
    • supersonicads.com
    • dewrain.life
    • ssacdn.com
    No OpenVPN or WireGuard configs

    Another worrisome part of this service is the fact that the only protocols they offer are IPSec and Hydra. Hydra is a proprietary VPN protocol developed by the cybersecurity company, AnchorFree. According to AnchorFree, Hydra VPN is designed to provide “faster and more reliable connections” compared to other VPN protocols such as OpenVPN and IPSec. The fact that they do not offer WireGuard confirms the fact that I would never use this product.

    Unfortunately, VPN 360 is just another one of those “free” VPN apps that’s mobile-only and barely even worth considering. Don’t waste your time with it – it’s security and privacy features are weak, its connection speeds are completely unreliable, and it doesn’t even work with Netflix. Plus, the app is absolutely riddled with ads. Seriously, there are so many other VPN options out there that are way safer and more trustworthy – go with one of those instead.

    Related Posts
  • IVPN

    IVPN

    App Telemetry

    In our analysis, IVPN primarily establishes connections to its own domain, api.ivpn.net, which can be logically tied to the app’s core functionality. A notable feature is its lack of telemetry, reinforcing its standing as a true privacy-focused application. Additional connections to Apple’s ecosystem, namely inappcheck.itunes.apple.com and mzstorekit.itunes.apple.com, are indicative of routine in-app functionality rather than invasive tracking or advertising. Furthermore, domains such as apps.identrust.com and r3.i.lencr.org relate to certificate authorities and secure communications, which are essential components of any robust VPN service.

    Given that the connections are largely restricted to primary service domains and standard app functionality, IVPN maintains a strong commitment to user privacy. The absence of telemetry data adds to its credibility as a privacy-centric application. Thus, IVPN achieves an A rating on our privacy grading scale, serving as a benchmark for what a privacy-focused app can offer.

    Privacy Policy

    IVPN’s privacy policy is pretty much a gold standard if you’re looking for anonymity and data security. They collect the bare minimum of information needed to operate their service—no personal info like your name or email required at sign-up. Even better, they have a strict no-logging policy for your VPN activity. They’re also transparent about what little data they do collect, mostly for transactional purposes, and give you options for anonymous payments. On the legal front, they’re under EU jurisdiction, which has strong data protection laws. Overall, if you’re concerned about your online privacy, IVPN seems to tick all the right boxes.

    One of the most striking features of IVPN’s privacy policy is its commitment to collect the “minimum information required to operate our service.” The company explicitly states, “When you sign up for IVPN, you will not be asked for any personal information e.g. email address, name, etc.” By not collecting personal identifiers, IVPN makes it extremely difficult for any external entity to link VPN activity back to an individual user. This minimal data collection is a significant pro for those concerned about anonymity and privacy.

    IVPN’s no-logging policy is another cornerstone of its privacy-centric approach. The company states unequivocally: “We do not log any data relating to a user’s VPN activity.” This includes no traffic logging, no connection timestamps, and no DNS request logging. Without these logs, even if the company were compelled by legal authorities, it couldn’t provide information about user activities. This no-logging policy significantly enhances user security and privacy.

    IVPN sets itself apart by being transparent about what limited data they do collect, specifically for transactional purposes. They state: “When you add time to your account, the following information is stored: Payment ID, Account ID, Amount, Currency, Timestamp, Transaction ID.” While this data is necessary for transactions, the company also offers anonymous payment methods such as cash and cryptocurrency for those who wish to take extra precautions.

    On the legal front, IVPN is subject to European Union (EU) law, widely considered to have strong data protection regulations. The company assures users that “if it ever becomes required by law for us to keep a persistent log of our customers’ connections or any personal data relating to their network activity, we will immediately notify our customers and do everything in our power to move jurisdictions or close the service.” This commitment to privacy even in the face of legal challenges further strengthens the company’s standing as a privacy-focused service.

    Speed Test

    Speed tests, by their nature, are highly contextual. They depend on various factors, such as the user’s location, hardware configuration, and the quality of the network infrastructure. That said, they still serve as valuable frames of reference. For our tests, we chose a server located in the Seattle region. The results were impressive: IVPN delivered 516 Mbps on the download and 24 Mbps on the upload, with a latency of just 18.5 ms. Unlike many other VPN services that often suffer from server overutilization or speed throttling, IVPN showed no signs of either. The high-speed performance and low latency indicate a well-maintained and robust server network.

    Related Posts

  • CyberGhost VPN

    CyberGhost VPN

    CyberGhost VPN was founded in 2011 in Bucharest, Romania, and initially began as a free VPN service. By the following year, it had gathered around 1.7 million users​. In 2017, a notable change occurred when Kape Technologies (then known as Crossrider) acquired CyberGhost VPN. This acquisition brought about concerns among observers due to Crossrider’s background as an ad-tech firm known for concealing spyware within its apps, which seemed to present a conflict of interest given CyberGhost’s focus on privacy. However, these concerns were largely allayed as Crossrider rebranded to Kape Technologies and positioned itself as a “privacy-first digital security software provider.” Following this, Kape Technologies went on to acquire other well-known VPN brands such as ExpressVPN and Private Internet Access, though these continue to operate independently. As of 2023, CyberGhost VPN has grown significantly with around 38 million users, making it one of the more popular VPNs available​.

    The company faced a minor hiccup in 2020 when a breach involving Typeform affected around 120 of its users. However, no evidence has emerged to suggest improper use of subscriber data by Kape, its subsidiaries, or any third parties. Despite past skepticism due to its history, CyberGhost VPN has maintained a strong reputation for privacy, continuing to provide valued services to its global user base​.

    Can I torrent with CyberGhost?

    One of the most popular reasons why people use VPNs is to encrypt their traffic and mask their IP while using P2P or BitTorrent services. CyberGhost even offers P2P servers to enhance your experience. However, right in section 8 of their Terms of Service is this alarming statement:

    We reserve the right to take appropriate measures when CyberGhost Products are being used contrary to these Terms and applicable laws, including cooperating with public or private authorities as provided by law.

    The “terms and applicable laws” are so broad that it essentially means anything illegal based on your local laws, wherever you may be. For DMCA violations generally they will just terminate your account and offer no refund. That being said, intellectual property companies rarely bother to file DMCA complaints for IPs associated with VPNs, especially when that company is registered outside of the United States.

    What services are accessible when connected to CyberGhost?

    ServiceBlocked / Restricted
    Amazon PrimeAccessible for browsing; streaming blocked
    NetflixAccessible for browsing; streaming blocked
    SpotifyAccessible; CAPTCHA during registration
    PandoraAccessible
    YouTube MusicAccessible
    HuluAccessible
    Disney+Accessible; no restrictions
    Google SearchCaptcha
    ChatGPTSome IPs blocked
    YouTubeAccessible

    Data collection

    Like almost every VPN, CyberGhost does collect some maintenance-related data, but it claims to not log your server location choices, your total amount of data transferred nor your connection timestamps. As with any VPN, it’s nearly impossible to independently verify the company’s no-logs claim. Even so, CyberGhost does log certain user hardware data in what is likely a bid to enforce the company’s limit of seven simultaneous connections per account. 

    According to the spokesperson CNET spoke to in August of 2019, CyberGhost does have the ability to help law enforcement by activating a limited user-tracking feature.  

    “The only way to do it is if that user is still in the system and if the law enforcement knows the IP and could provide also a warrant to track that IP,” the spokesperson said. “We can activate a special feature like a logging feature for that IP, but we have that ability to prevent malicious actions when using our service. But only if that user is still active and we have proof of what exactly is wrong, what IP he is using, and so on. So we’ve got to bring that in order to activate that, to be sure we don’t activate it on a regular user. Otherwise, we can not help any law enforcement company.” 

    In 2016, however, CyberGhost was called to the carpet by ProPrivacy when the company was discovered to be quietly requesting potentially dangerous, root-level access to customers’ computers — a function the software hasn’t included for about three years now. The service was also caught logging the unique identifiers of each of its user’s computers. Similarly, other reviewers have also expressed wariness after CyberGhost appeared to remove some threads from its forum which may have detailed a critical 2016 malfunction and potentially revealed log-keeping practices within its free proxy service.

    Speaking of revelations, in March 2019, CyberGhost took a small hit when the customer-survey company it contracted, Typeform, was breached. The company said 120 email addresses and 14 CyberGhost usernames — but no passwords — were included in the two forms involved in the compromised data. 

    The bigger concern for me is that CyberGhost still uses a method of ad-blocking that’s considered at best ineffective and at worst insecure. Most VPNs block ads by filtering out requests from websites identified as suspicious. Not CyberGhost. The company instead uses a method which inspects and modifies — rather than filters out — those requests. The method is twice as risky and only half effective since it only works on sites with an HTTP URL and not those with HTTPS. 

    CNET asked Beyel in June this year about this method of ad-blocking and the criticism it’s received. 

    “We know this is not very effective. That’s why we’re already working on a better solution which is working on the process,” he said. “We need to completely move this kind of technology on the client side because in the browser you can, of course, do that.” 

    In its suite of features, however, CyberGhost does offer an option (enabled by default in its MacOS client) which forces your browser to redirect away from sites not secured by HTTPS. 

    Beyel also said that CyberGhost will be releasing a new suite of privacy modules in the coming weeks which go beyond its VPN to include tools for optimizing your computer and preventing vulnerable apps from affecting your privacy.[2]

    See also:

  • Mozilla VPN

    Mozilla VPN

    When you are using Mozilla VPN, whose servers are you really using? According to my research, Mozilla leases hardware from a few different well known providers such as Datacamp Limited, Tzulo, 31173 Services, and xTom.

    Some people are drawn towards Mozilla VPN because they are already familiar with Mozilla’s Firefox browser and so the name is familiar. Mozilla has a proven track record of advocating for individual privacy and taking great measures to enhance their users’ privacy online. Some, however, do not like to keep all their eggs in one basket as the saying goes so they choose to keep their browser and VPN company separate.

    Mozilla VPN’s server coverage consists of over 400 servers placed in around 40 locations, which isn’t as big as some other competitors but it should be enough for most users. More experienced users will be glad to know that Mozilla VPN uses the same servers as Mullvad, which is another well-known and trusted brand. Mozilla VPN only uses WireGuard protocol, the absolute best for performance and security.

    Network Overview

    P2P is supported and you can even use a multi-hop VPN that allows you to enter from one location and exit from another, which keeps your location even more secure.

    Features include a kill switch that can be set to deploy in the event that the VPN drops out. However, if this advanced-level security isn’t required for all your tasks, split tunneling ensures you can carry on browsing using a standard connection too.

    Be aware that although Mozilla VPN works with up to five devices, they all need to be registered. So, if you’re already at the maximum capacity, you’ll need to deregister one of the devices before you can add another. Some providers, like KeepSolid VPN Unlimited, have similar rules, but most, like ExpressVPN, don’t force you to register a device before you can use it, which makes the process far simpler.

    Pricing is a pretty standard $9.99 for a monthly account which drops to $7.99 for a six month plan, or go for a full year and it’s the equivalent of $4.99 per month. All rather average then. However, you will benefit from a 30-day money-back guarantee with no hidden catches, so you can test the service to see if it fits.