Simply explained :: Do VPNs enhance your privacy?

by Volker Weber

Sketch

Ars Technica has a trending story about a research paper investigating hundreds of VPN apps for Android. This seems to be complicated but it isn't. It's all about a simple question: whom do you trust?

The sketch shows you how a VPN works. You have a network tunnel from point A to point B. This tunnel traverses a network you do not trust, like "The Internet" for instance. The tunnel has two endpoints A and B. They are supposed to be in safe territory. B could be behind your company firewall, A on your trusted device. Do you see the problem? A and B have to be trusted. If you have an app on A you cannot trust, or if you simply don't know where B is, then you are not enhancing your privacy because all of your traffic goes in and comes out at A and B. It is way easier to track you, if you always take the same road.

Comments

I use a VPN service mostly on open Hotel networks ... sure someone could start a MitM attack and also get my traffic but that is way more unlikely than someone just sniffing all open communication. But I do pay for my VPN service, that's why I trust them. And I do recognize that at B my traffic will also be very likely automatically analyzed by our three lettere friends.

Martin Hiegl, 2017-01-30

If you want to enhance security for a particular tasks it is strongly advisable that the app that has to perform that secure transaction, is also responsible to create a trustworthy encryption.

Thanks for pointing out that a VPN only helps you to mitigate an untrusted networking segment.

Dirk Bartkowiak, 2017-01-30

You're showing off, doodling on your Surface again, aren't you vowe? :)

John Ash, 2017-01-30

I wouldn't call it showing off. But you are right, that is what I use the pen for very often. I like these sketches more than Visio graphs.

Volker Weber, 2017-01-30

Recent comments

Sven Richert on Link Bracelet für Apple Watch at 17:09
Felix Binsack on Link Bracelet für Apple Watch at 17:03
Volker Weber on Apple Watch :: Welche für wen? at 16:26
Volker Weber on Link Bracelet für Apple Watch at 16:06
Sven Richert on Link Bracelet für Apple Watch at 15:59
Pierre Lalonde on HCL is steaming ahead at 15:41
Matthias Welling on Apple Watch Activity Competition #dontbreakthechain at 14:28
Christoph Spitz on Apple Watch Activity Competition #dontbreakthechain at 12:41
Ralf ter Veer on I don't understand the Google Pixel at 12:01
Stephan Perthes on Apple Watch Activity Competition #dontbreakthechain at 11:36
Daniel Meyer on Link Bracelet für Apple Watch at 10:37
Ralph Inselsbacher on Apple Watch Activity Competition #dontbreakthechain at 10:13
Jens-Christian Fischer on Apple Watch Activity Competition #dontbreakthechain at 09:03
Volker Weber on Apple Watch Activity Competition #dontbreakthechain at 08:49
Bernd Ries on Apple Watch Activity Competition #dontbreakthechain at 07:55
Bernd Hofmann on Apple Watch Activity Competition #dontbreakthechain at 00:18
Sven Bühler on Apple Watch Activity Competition #dontbreakthechain at 19:40
Dirk Bartkowiak on Apple Watch Activity Competition #dontbreakthechain at 16:11
Anton Seissl on Apple Watch Activity Competition #dontbreakthechain at 15:25
Volker Weber on Apple Watch Activity Competition #dontbreakthechain at 11:19
Andreas Braukmann on Apple Watch Activity Competition #dontbreakthechain at 09:32
felix schwenzel on Apple Watch Activity Competition #dontbreakthechain at 08:43
Jens-Christian Fischer on Apple Watch Activity Competition #dontbreakthechain at 08:05
felix schwenzel on Apple Watch Activity Competition #dontbreakthechain at 07:49
Oliver Stör on Apple Watch Activity Competition #dontbreakthechain at 07:44

Ceci n'est pas un blog

I explain difficult concepts in simple ways. For free, and for money. Clue procurement and bullshit detection.

vowe

Contact
Publications
Stuff that works
Amazon Wish List
Frequently Asked Questions

rss feed  twitter  amazon

Local time is 17:16

visitors.gif

buy me coffee