Questions about StrongVPN

Thick Face Black Heart

Alfrescian (InfP)
Generous Asset
Joined
Jan 5, 2010
Messages
12,289
Points
113
Tried asking customer service but didn't get much from them, so would like some independent feedback here.

(a) Since strongVPN uses layer of encryption, does it mean that if I do all my online transactions (shopping, signing up of email accounts, providing personal data, brokerage transactions, trading, etc) with sVPN turned on, it will be safer?

(b) Is there any advantage using sVPN and Tor at the same time?

(c) Is it a security problem if my brokerage acc insists I enter the password on a non-https URL? Would sVPN help prevent breaches?
 
What if breaches happens at database level at source or destination:confused:

Tried asking customer service but didn't get much from them, so would like some independent feedback here.

(a) Since strongVPN uses layer of encryption, does it mean that if I do all my online transactions (shopping, signing up of email accounts, providing personal data, brokerage transactions, trading, etc) with sVPN turned on, it will be safer?

(b) Is there any advantage using sVPN and Tor at the same time?

(c) Is it a security problem if my brokerage acc insists I enter the password on a non-https URL? Would sVPN help prevent breaches?
 
No such thing lah.

VPN usually protects a section of link between 2 places only. e.g. yr home to yr office. So that you can be at home accessing your office LAN as if you were in office. That the pipe between yr home / office is encrypted and e.g. your ISP won't be conveniently peeping yr office files. REMEMBER they CAN break encryption if they want to, any one can with today's computer power. As long as they have access to the encrypted data packages they can copy them save them and use a software tool to break the encryption which will give them the results after some very reasonable time - depending on the power of computer used.

I think you refer to strongvpn.com the service provider. They can give you an encrypted tunnel between your PC and their service center. That's all. If you surfed say sammyboy.com via them your traffic section from their service center to Sam's server is still NOT encrypted. Simply standard traffic, because unless Sam setup another tunnel for you as well. In your case you mentioned shopping & email, that is same unless the shopping sites and email providers gave you VPN tunnel setup.

http://techie-buzz.com/tech-news/1024-bit-rsa-cracked.html
1024 bit RSA Cracked, new Milestone
by Chinmoy Kanjilal | Thursday, 04th Mar 2010 | 10 Comments | Share



Researchers at the University of Michigan have achieved a tech-marvel by moving a step further in cracking RSA. The seemingly secure; public key encryption algorithm was last cracked on 7th January, 2010. The encryption in the last crack was 768 bit but this time, the crack is on a 1024 bit encryption.
security.JPG

What is RSA?
In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it) is an algorithm for public-key cryptography[1]. It is the first algorithm known to be suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations.

How was the crack achieved?
The RSA crack this time, was achieved by Valeria Bertacco, Todd Austin and Andrea Pellegrini. They varied the voltage levels at the sender end to make faulty encryptions. This helped them recreate the private key by combining a number of fragments, achieved in the process. The complete operation took 100 hours. A quote from the research paper says,
first, we develop a systematic fault-based attack on the modular exponentiation algorithm for RSA. Second, we expose and exploit a severe flaw on the implementation of the RSA signature algorithm on OpenSSL, a widely used package for SSL encryption and authentication. Third, we report on the first physical demonstration of a fault-based security attack of a complete microprocessor system running unmodified production software: we attack the original OpenSSL authentication library running on a SPARC Linux system implemented on FPGA, and extract the system’s 1024-bit RSA private key in approximately 100 hours.
Why is this important?
The RSA encryption was believed to be quite safe and this level of a crack was not achieved, until now. The methods used here are pretty low level and have given results in 100 hours. The crack which was assumed to take a lifetime with bruteforce, has taken a mere four days. This breaks the very backbone of RSA which believes that as long as the private key is safe, it is impossible to break in, unless guessed.

How will it affect me?

RSA is used in most of the secure connections online ranging from e-commerce to login operations. The length of the key determines the level of security. But this crack is independent of the length of the key. Also, the method is crude and easy to implement.
As a response to this crack, Some changes in the RSA implementation are imminent. Till then, let’s just hope we are secure.
[Image via:pjlighthouse ]
 
Last edited:
uncleyap said:
No such thing lah.

VPN usually protects a section of link between 2 places only. e.g. yr home to yr office. So that you can be at home accessing your office LAN as if you were in office. That the pipe between yr home / office is encrypted and e.g. your ISP won't be conveniently peeping yr office files. REMEMBER they CAN break encryption if they want to, any one can with today's computer power. As long as they have access to the encrypted data packages they can copy them save them and use a software tool to break the encryption which will give them the results after some very reasonable time - depending on the power of computer used.

I had personally came across the hacking of the email system in a secured LAN of a large public listed company by a US company. You could literally read emails as if everything were copied to you. Not sure whether they used the services of CIA.
 
i only use strong vpn to watch USA channel and UK channel on the TV station website.

I am not sure protection is 100% against hacker or singapore ISD, but any security is better than nothing.
 
I had personally came across the hacking of the email system in a secured LAN of a large public listed company by a US company. You could literally read emails as if everything were copied to you. Not sure whether they used the services of CIA.

ALL SECURITIES ARE ILLUSION & SELF-DECEPTION essentially. ANY security breaches are possible, if not now, then just at another time, if not any time, then just some other time.;)
 
No such thing lah.

VPN usually protects a section of link between 2 places only. e.g. yr home to yr office. So that you can be at home accessing your office LAN as if you were in office. That the pipe between yr home / office is encrypted and e.g. your ISP won't be conveniently peeping yr office files. REMEMBER they CAN break encryption if they want to, any one can with today's computer power. As long as they have access to the encrypted data packages they can copy them save them and use a software tool to break the encryption which will give them the results after some very reasonable time - depending on the power of computer used.

I think you refer to strongvpn.com the service provider. They can give you an encrypted tunnel between your PC and their service center. That's all. If you surfed say sammyboy.com via them your traffic section from their service center to Sam's server is still NOT encrypted. Simply standard traffic, because unless Sam setup another tunnel for you as well. In your case you mentioned shopping & email, that is same unless the shopping sites and email providers gave you VPN tunnel setup.

http://techie-buzz.com/tech-news/1024-bit-rsa-cracked.html


Uncle Yap,

Thanks for this info.

You've told me exactly what I was trying to find out!

Cheers!
 
uncleyap said:
ALL SECURITIES ARE ILLUSION & SELF-DECEPTION essentially. ANY security breaches are possible, if not now, then just at another time, if not any time, then just some other time.;)

That company was a local publicly listed company.
 
That company was a local publicly listed company.

Almost all concepts of securities are based on:

  • doing something that most others don't know (secretive)(information)
  • implementing something that is causing some difficulties (challenges)(ability / resources)
  • implementing something that is causing threats to others (risk)(ability / resources)


The net effects of all security measure just creats a pyramid shaped differentiation, the height of the pyramid represents level of security. The volume (of pyramid) below any particular height level represents the amount of people deprived of access due to their own limitations of (information, abilities, resources). The volume (of pyramid) above any height represents the amount of people have access due to their own advantages of (information, abilities, resources).

To penetrate ANY security is only limited by amount of efforts; strength; resources; time; opportunity; & will, that's all.
 
Back
Top