Which VPN provider and why?

Badger

RIPPER
Messages
245
Reputation
36
Reaction score
42
Points
28
I would first say, be wary of any provider on a forum, that's exactly how DM went down. A member offered VPN and everyone jumped on, assuming they were hidden only to find out later, it was a honeypot.

With your VPN choice, also list which country you prefer to use. Obviously USA is horrible option as is EU (due to EU Data Retention Directive).

According to the directive, member states will have to store citizens' telecommunications data for six to 24 months stipulating a maximum time period. Under the directive the police and security agencies will be able to request access to details such as IP address and time of use of every email, phone call and text message sent or received. A permission to access the information will be granted only by a court.

That means no germany, netherlands, etc. Even if they do not "keep logs" of data, traffic or connection it is possible through court order to force them to install backdoor or sniffer onto system for LEO to monitor usage of a particular account (especially if your DNS leaked and they caught your exit node). Even ukraine (and netherlands again) now partners with FBI to bring down cyber criminals hxxps://www.fbi.gov/news/pressrel/press-releases/international-cooperation-disrupts-multi-country-cyber-theft-ring

Which country is best? Russia? Ukraine? Hong kong?


Share your thoughts. please dont just post "xyzvpn" without your reason or consideration. I will start a list with some GOOD/BAD VPN for your convenience. As always, do your OWN research before using any service. become familiar with PTPP vs OPENVPN, dns leak, proxy chains, rdp, shell etc.


popcorn





Good/Trustworthy===============================




Untrusted/Questionable===============================
NVPN - hxxp://nvpn.com
Usually called good service but look at TOS. Despite claiming they DO NOT KEEP LOGS, their TOS explains they can block you for multiple IP to same acct at same time. How do they know this? They MUST keep some form of connection logs!
* Sharing a login between people
* Simultaneous logins from multiple IP addresses

BLACKVPN - hxxp://blackvpn.com
We only log the following information:

The time of the connection and disconnection to our Services
The internal RFC1918 (https://tools.ietf.org/html/rfc1918) IP address assigned by us to a particular user at each time
Bandwidth utilization of each user
Email address

We will fiercely protect the privacy and rights of our users and we will not disclose any information on our users to anyone, unless forced to by law enforcement personnel that have produced the proper legal compliance documents.

All connection logs are anonymized on all servers. Your real IP is never logged anywhere.

HMA - hxx://hidemyass.com
OBVIOUS REAONS
 
Last edited:

noptical101

Professional
Messages
247
Reputation
20
Reaction score
22
Points
18
best option is to buy a vps and run your own vpn through it

I agree..but sometimes u get banned from that too.
also using alone 1 vpn , could be good or very bad (denial wont work in case of some police investigation )
 

turbobox

Professional
Messages
169
Reputation
17
Reaction score
18
Points
18
I also think its also important to not only rely on the anonymity of only VPN by itself.
But add some extra layer of security. Use also private socks, maybe set up a chain in proxifier firewall.
Tor browser, hacked rdp also works great.

And the worst VPN I heard of would be Hidemyass. (LulzSec Hacker Exposed by the Service He Thought Would Hide Him)
http://www.theatlanticwire.com/tech...osed-service-he-thought-would-hide-him/42895/
 

stampbaby

BANNED
Messages
119
Reputation
16
Reaction score
16
Points
18
Please note, if you want to make a deal with this user, that it is blocked.
1. Only use VPNs that allow you to pay with LR.
2. Use socks during sign-up and download with VPN provider.
3. Use two VPNs:
connect to the first VPN using PPTP
connect to the second VPN using OpenVPN

Using this set-up is a great way for the second VPN(the IP that will be displayed online) to never know the origin of the original IP because it logs the PPTP IP when it connects.

It is crucial that the first VPN provider be located in a country that is not "usa" or "eu" friendly in case they keep logs. Even the ones that say they do not keep logs cannot be 100% trusted.

Any input on this set-up will be welcomed with open arms. Thanks guys.
 

p3rito

Professional
Messages
124
Reputation
22
Reaction score
28
Points
28
I have hack SSHs, and tunneling traffic through putty. Always connecting in the hacked SSH with some bought VPN (don't trust their service 100%).
So the way is:
IP -> VPN (not 100% trustable) -> Hacked SSH + Proxifier -> Internet
What about that?
 

Porter

UNRESOLVED PROBLEMS
Messages
28
Reputation
12
Reaction score
14
Points
3
NVPN - hxxp://nvpn.com
Usually called good service but look at TOS. Despite claiming they DO NOT KEEP LOGS, their TOS explains they can block you for multiple IP to same acct at same time. How do they know this? They MUST keep some form of connection logs!
Quote:
* Sharing a login between people
* Simultaneous logins from multiple IP addresses
So if my service provider doesn't allow multiple simultaneous connections to their servers does this mean they are keeping logs ? or can it be that they are only seeing that someone is logged in and if someone else logs in to the same account they end connection. Please explain how this works ?
 

Haha63011

Member
Messages
6
Reputation
0
Reaction score
0
Points
1
what about signing up to VPN service with sock on a open wi-fi.... interested post more
 

allenlin

Carder
Messages
81
Reputation
6
Reaction score
8
Points
8
1. Only use VPNs that allow you to pay with LR.
2. Use socks during sign-up and download with VPN provider.
3. Use two VPNs:
connect to the first VPN using PPTP
connect to the second VPN using OpenVPN

Using this set-up is a great way for the second VPN(the IP that will be displayed online) to never know the origin of the original IP because it logs the PPTP IP when it connects.

It is crucial that the first VPN provider be located in a country that is not "usa" or "eu" friendly in case they keep logs. Even the ones that say they do not keep logs cannot be 100% trusted.

Any input on this set-up will be welcomed with open arms. Thanks guys.

Did anyone manage to setup like this? I connect via PPtP but no traffic going (No internet access). Any tips?
 

Veeker

Professional
Messages
165
Reputation
6
Reaction score
9
Points
18
what about cyberghost? they say they dont keep logs at all.
 

G00DFELLA

Professional
Messages
102
Reputation
7
Reaction score
13
Points
18
Any comments on PrivateInternetAccess?
 

p3rito

Professional
Messages
124
Reputation
22
Reaction score
28
Points
28
Any comments on PrivateInternetAccess?
I was using this service sometime ago. But 2 things that I didn't liked:
1 - they are a UK company, everybody knows UK is a big brother shit.
2 - they don't use OpenVPN client, but their own aditional client...

Anyway, my conclusion is: don't put your face as big shot into internet (getting vendor into forums, hacking big companies, etc, etc, etc...) using only VPN services. You need something else, maybe connect through a SIM card without your real name/address, or make more tunnels than the VPN only... And for 'normal users' like us, try to change your VPN service every 3 or 6 months... :beer
 

Carding

Professional
Messages
2,829
Reputation
17
Reaction score
2,087
Points
113

We check 7 popular VPN providers for privacy​


d9095f4e280f9bdc77fc4.png


First, let's define the criteria that we will look at. I suggest making such demands.
  • SSL certification of domains. If there are problems with it, then MITM attacks are possible.
  • No substitutions in the license agreement. A provider that sees user privacy as a big deal should not try to force you to agree to anything.
  • Support for strong encryption and modern protocols. In some countries, standard connection types such as PPTP, L2TP IKEv1, OpenVPN UDP, and others are successfully blocked using DPI equipment. A self-respecting provider must provide workarounds. As for encryption, everything is individual here. I will only note that the PPTP Protocol used in conjunction with MS-CHAP was hacked in 2012. Since then, anyone who pays $ 17 has the ability to decrypt the traffic.

CyberGhost VPN
CyberGhostVPN is a German-Romanian service that has been operating since 2007. Few people stay afloat that long. This service offers three types of connectivity: L2TP, OpenVPN, and IPSec.

There are no ways to bypass these restrictions. There is only the possibility of connecting via TCP on port 443 when using OpenVPN, which is already inefficient in countries with DPI. The SSL certificate for the resource was issued by Comodo and is valid until 23.02.2019.

Two years ago, CyberGhost was at the center of a scandal. One of the updates to his client installed a root SSL certificate on the user's machines. What's wrong with that? The fact is that when you establish an HTTPS connection, your data is protected by the SSL/TLS Protocol, which is confirmed by a special certificate issued by an authorized company. The browser checks the list of OS certificates and, if everything matches, allows you to log in to the site. The CyberGhost update added its certificate to this list, which opened up the possibility of a man in the middle attack.

The company was quick to issue a rebuttal, but later another problem was revealed: the proprietary Windows client logs the computer's system data, such as the name of the video chip, processor model, and user name. What can I say? My reputation is ruined.

As for the Privacy Policy, everything is very interesting here. In an article from their knowledge base, the server management clearly and without antics States that logs are not being kept. However, looking at the "privacy policy" gave me some questions.

cd992aa04509da9ac8054.jpg


The" anonymization " of IP is hard to believe, and the rest does not cause warm feelings. Any data collection contradicts the answer in the knowledge base, where it is stated that there are no logs.

NordVPN
NordVPN is a rapidly growing service registered in Lithuania. It has been operating since 2013. In the column "Our partners" it was previously indicated that the office received a CCNP certificate from CISCO, but then this information disappeared from the site.

bf9290231e0197f62994a.jpg


CISCO certificate from the web archive.

Why did the certificate information disappear from the site? How did you manage to get this certificate without any merit? There are no answers, and they were clearly removed for a reason.

In "Privacy policy" also found problems. One point says that logs are not kept at all, the other tells us that the service has the right to store a limited amount (how much?) personal information for two years.

9f99cb81d88e5169e275f.jpg


The site claims that the server pool consists of 5,178 units located in 62 countries. Connection methods used: OpenVPN, L2TP, and IPSec. A nice bonus is the ability to bypass DPI via stunnel.

With NordVPN, everything would be fine, if not for the history with the CISCO certificate and the license agreement, which allows service owners to collect information, but does not specify what exactly.

But there is another interesting point. Two Reddit users undertook an independent study, according to which NordVPN belongs to the well-known datamining company TesoNet.

It seems that this is what allows the service to spend half a million dollars a month (just think about this figure!) to buy reviews and ads for your product. So, according to the site adweek.com NordVPN spent $ 497,000 on advertising in February 2018 alone. Where does this money come from? I think the answer is obvious.

It turns out that using this service is extremely dangerous: instead of anonymity, you can provide detailed logs for datamining. And finally, one more unpleasant story. In an advertising rush, NordVPN employees increased the rating of fake reviews on the site trustpilot.com. This fact was confirmed by the resource administration.

2cc50e6617576a0a89764.jpg


Private Internet Access
Private Internet Access is a well-known VPN service among foreign pentesters. Among its analogues, it stands out for its detailed encryption settings (you can change the connection port, encryption type, and key), the presence of built-in DPI bypass methods, as well as its own SOCKS5 proxy and SSH tunnel. In a word, at least now give a medal, but alas…

First, web.archive.org it doesn't know anything about the time of this service's existence or about older versions of the site. It seems that the administration has asked to remove them, and this is a worrying sign.

I was able to find out that this provider is located in the United States, and also belongs to a certain pseudo-conglomerate, whose area of activity ranges from VPNs to boutiques.

Yes, Private Internet Access has the ability to encrypt with a 4096-bit key. Yes, he calmly puts DPI on the shoulder blades, but what is the point if at the first call of Uncle Sam all the data will be in the hands of the authorities?

e8d04a4eb4fdf6bcad6b4.jpg


Let's try to search for information about the host company-London Trust Media. My search quickly led me to an articlestating that mark Karpeles was appointed Executive Director of this company, with the full connivance of which the Japanese crypto exchange Mt.Gox was robbed. I have no confidence in this comrade and cannot be.

HideME VPN
HideME is the most well-known VPN service in Runet. It has been operating since 2007. You can only log in if you have a digital code that Google can easily find on thematic forums.

One of the types of connection to HideME VPN is PPTP, which in itself is not good-the Protocol is vulnerable. In addition, in 2016, at the request of the Russian authorities, HideME disabled the anonymizer for Russian users. We could leave it at that, but I suggest you take a closer look at the privacy policy.

Yes, they may have refused to register, but keys that are absolutely not hashed can be picked up in three days with proper skill. In addition, pay attention to the first paragraph, as well as how the RCN request was processed. Using this service for anything other than accessing Spotify should be avoided at all costs.

Hide My Ass! VPN
Hide My Ass is one of the most famous providers in the world. It belongs to Avast. Many people will be put off immediately, but we will continue to study. The service has existed as an anonymizer since 2005, and the VPN function appeared in 2009. The great difference between Hide My Ass and all the providers reviewed is the huge number of output countries. However, unfortunately, there is nothing to be happy about.

In 2011, this provider turned over to the US authorities one of the members of the LulzSec group - Cody Andrew Kretzinger. Moreover, the administrators also wrote a long post in their defense. The issue of logs was allegedly justified. But this person could have been any journalist or human rights activist in a totalitarian country.

be2649da4dca46cb6ebd8.jpg


The conclusion suggests itself: Hide My Ass will at any time give out the very thing that it promised to hide safely, and therefore it is not suitable for serious applications.

PureVPN
PureVPN is another popular provider created in 2008-2009. Standard set of protocols: OpenVPN, L2TP, and IPSec. PureVPN became famous for turning over annoying cyberstalker Andrew Lin to the authorities (we wrote about this story). From the point of view of morality, you can treat this story as you like, but the fact is obvious: the logs are stored.

VyprVPN
VyprVPN became active in 2010. Registered in Switzerland. It has a standard set of protocols: OpenVPN (AES-256), IPSec, and L2TP. I am glad to have a crawl through stunnel, which marketers proudly call Chameleon - let's leave this on their conscience.

We are also interested in the license agreement, which is quite sufficient for conclusions.

08e290da729f6692ea4d4.jpg


The input (real) IP address is stored for thirty days, and that says it all.

Conclusion
It turns out that none of the popular VPN services we studied passed even a basic check without applying a technical audit. For me personally, this means that there is no faith in such providers and can not be. Therefore, anyone who is concerned about anonymity and privacy, I advise you to still study the documentation and raise your OpenVPN server. And to bypass DPI, you can add tunnel yourself.
 
Top