Page 25 - 11Cyber
P. 25

blog.
          (Continued from page 24)
             BY-NC-SA 2.0 1                                    All photos and images are licensed as noted in the
                                                               Credits under a Creative Commons Attribution 2.0
          13. "Day 76 of 365: kuchenne rewolucje" by Arek      International License.
          Olek (cropped) is licensed under CC BY 2.0
                                                               Creative Commons Attribution 2.0 International Li-
          This work by Arthur Gresham is licensed under a      cense. Creative Commons Attribution 2.0 International
          Creative Commons Attribution 4.0 International Li-   License.
          cense.

          As long as you attribute this article, you can use it
          in part, or whole, for your newsletter, website, or




                                             Cautionary Tale about Free VPNs


                                                By Joel Ewing, President, Bella Vista Computer Club




         One of the caveats in the VPN article in the March    or whether that hardware is configured correctly to at
         2021 Bits & Bytes, also mentioned at the March        least make it as secure as possible. Because of the
         General Meeting, was that free VPN services were      limited number of users on one Wi-Fi network, the
         not recommended. As if on cue, see the following      motivation to expend much effort to hack that one net-
         article recently published by Malwarebytes Labs on    work is not high. But, if it shares an exposure common
         "21 million free VPN users' data exposed."            to many other Wi-Fi networks using similar hardware,
                                                               it could be at risk. Furthermore, the users have no
         A hack of several free VPN services revealed that
         not only were some services collecting user activity   way of knowing the details of a particular public Wi-Fi
         logs in contradiction of their advertised policy, but   node, so it is wise to err on the side of caution. A VPN
         some were also collecting email addresses, pass-      service, on the other hand, may have hundreds of
         words that were not encrypted, IP addresses, mo-      thousands of users.
         bile device models, and IDs.                          The possibility that a free VPN service may be engag-
                                                               ing in questionable behavior and be holding sensitive
         The whole point of using a VPN with mobile devices
         is to avoid exposing non-encrypted data when using    user data on its servers makes it an extremely attrac-
         a public Wi-Fi network; but if that data would have   tive target for hackers and data thieves, who can justi-
         been non-encrypted on a public Wi-Fi without VPN,     fy spending much time and effort to break in. That
         then with a VPN service, it is still exposed non-     makes any collection of sensitive information by a
         encrypted within the server of your remote VPN ser-   VPN service a more serious concern. One of the sug-
         vice. In addition, if the service also requires a spe-  gestions made is that you should look for reviews of a
         cial app to be installed on the mobile device, then   VPN service by known and trusted organizations be-
         that app will also see any nonencrypted data before   fore deciding on a VPN service. One of the interesting
         it is sent to the VPN service and potentially have    things that this data leak revealed was that there were
         access to other data on the mobile device. Thus, a    several differentlynamed free VPN services that all
         free VPN service is much more likely to be tempted    appear to be run by the same company. These were
         to exploit their access to non-encrypted data if that   all supported by mobile apps that were gathering in-
         is their only way to profit from the free service.    appropriate data, combined with the attempt to dis-
                                                               guise the company's true identity, suggest that this
         One of the reasons for distrusting the security of a   was a deliberate attempt to engage in unethical be-
         public Wi-Fi network is that you can never know       havior. Caveat Utilitor
         whether or not it is supported by secure hardware


         Cyber Awareness Bulletin                                                            25                                                                   October 2021
   20   21   22   23   24   25   26   27   28