What's new

VPN IpV6 Leakage

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

CaptainSTX

Part of the Furniture
An interesting article on how most commercial VPN services are vulnerable to IpV6 leaks.

The point of the article is that most VPN providers don't really offer the security that they advertise.

www.eecs.qmul.ac.uk/~hamed/papers/PETS2015VPN.pdf
 
This is good reading,

I think that TOR is a solid FREE VPN solution. As long you understand clearly the steps of maintaining and browsing privately.
If you don't care, then you are vulnerable, wasting time and resources.

Thank You
 
This is good reading,

I think that TOR is a solid FREE VPN solution. As long you understand clearly the steps of maintaining and browsing privately.
If you don't care, then you are vulnerable, wasting time and resources.

Thank You

If you look at a thread I started last week TOR has also been exploited by the Chinese and probably by any other hacker/nation state with the resources.

It this day and age to expect you have any more privacy on the Internet than mailing a post card is unrealistic.
 
I partially agree only 30 PERCENT of your statement.
1-Peer to Peer conversation and heavily encrypted is a good alternative.
I don't think that TOR is completely compromise. Except those mainland Chinese TOR nodes. But, if you desire a post card, I will send you one encrypted using GNU-PGP only. Good Luck Cyphering that one. We still have a lot of options such as using a SECURE VPN.

Another way is start using HTTPS browsing from your computer.
 
Last edited:
Well - TOR can protect transit inside the darknet, but sooner or later, packets need to emerge out to the real world... Big data is totally aware of TOR packets, and it's a simple analytic problem from there, and the exit nodes are always vulnerable - and exit nodes are on both ends.

Three words from Big Data - Deep Packet Inspection - every packet is examined, and those suspect packets are captured and logged - and then things are correlated...

Using TOR these days... perhaps not very smart unless one knows the risks... your provider knows what you're doing, and it does raise priority if a three letter agency wants to know what's going on... Most TOR traffic is related to very specific behavior - pr0n, drugs, piracy, fraud, bitcoins, black market - basically stuff that folks don't want to be tracked, so thus it is tracked and analyzed...
 
One way to protect yourself from IPV6 leakage if you arent using it is to drop forwarding,input and output of IPV6 on the firewall. I do this for one of my mikrotik routers i gave to my family since they have no use for ipv6. However i disable the input and output of ipv6 on the WAN sides (the PPPOE link, VLAN and ethernet link)
 
One way to protect yourself from IPV6 leakage if you arent using it is to drop forwarding,input and output of IPV6 on the firewall. I do this for one of my mikrotik routers i gave to my family since they have no use for ipv6. However i disable the input and output of ipv6 on the WAN sides (the PPPOE link, VLAN and ethernet link)

My wife had a debate with me about able or disable the ip6 in our routers and pfsense firewall desktop after a quick research, we opt to disable it!
Since, we are not using and for protection as minimum security risk.
 
Last edited:
Well - TOR can protect transit inside the darknet, but sooner or later, packets need to emerge out to the real world... Big data is totally aware of TOR packets, and it's a simple analytic problem from there, and the exit nodes are always vulnerable - and exit nodes are on both ends.

Three words from Big Data - Deep Packet Inspection - every packet is examined, and those suspect packets are captured and logged - and then things are correlated...

Using TOR these days... perhaps not very smart unless one knows the risks... your provider knows what you're doing, and it does raise priority if a three letter agency wants to know what's going on... Most TOR traffic is related to very specific behavior - pr0n, drugs, piracy, fraud, bitcoins, black market - basically stuff that folks don't want to be tracked, so thus it is tracked and analyzed...

Well If those IP-4 TOR nodes are already possess by a culprit dark spirit, then your encryption is compromise. Of course your ISP knows who you are, but done properly you could spoof your original IP, INTO something else and THEY CAN NOT even see your DATA traffic if done properly. Don't know about ip-6 never used it or try it.
 

Similar threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top