How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.

Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

Threaded View
A anonymous VPN program, how does it work?  I program so don't be too
simple, but here's what I envision after reading the below:

1. after you install the anonymizer software, your browser can, if
configured correctly, connect to the anonymizer company's servers via
HTTPS.  Thus the data from your PC to the anonymizer's servers cannot
be read by your ISP, or a Wi-Fi 'hotspot' such as at a hotel.

2.  when the data (encrypted via HTTPS as in step 1) gets to the
anonymizer company's servers, one of two things must happen.  First,
either the ultimate destination must support HTTPS (by ultimate
destination I mean say you want to connect to Facebook), or, the
anonymizer company's servers must decrypt from HTTPS and send your
data to the ultimate destination unencrypted.  In this second case,
everybody inbetween the anonymizer's servers and the ultimate
destination can read your data, but at least your ISP or hotel hotspot
could not.

BTW, I think the most popular sites like Facebook, Yahoo, Hotmail do
have HTTPS web services, so the first option in 2. is available, but I
think most website do not.  That was the implication I got reading
between the lines from another passage.

Further, I think that Steganos Internet Anonym is pretty good, albeit
a bit expensive at $99, since it allows you faster access to their
servers than the free services like CyberGhost VPN, which is too slow
from what I've read (unless you upgrade to the premium version).

Did I get it right?  Sorry for you types that don't like cross-posts.

RL

http://www.techsupportalert.com/best-free-anonymous-surfing-service.htm#Quick_Selection_Guide

The Software - this is the nuts and bolts of the anonymity machine
that deals with network data traffic and where to route it. Normally,
our network data flows straight through to our ISP and out, which
means our ISP keeps tabs on us all the time. Specialised software
allows us to encrypt our network data so that when it passes through
our ISP, they won't be able to see what it is.

Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.


Quoted text here. Click to load it

What does this have to do with antivirus? You write code, eh? Why
couldn't you wrap your head around SSL then?
 

This doesn't belong in antivirus.


--
Stupidity isn't a crime. So you're free to go.

Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.


Quoted text here. Click to load it

Then why are you replying to it? Tip for the amatuer...no reply...they
look elsewhere....duh.

--
Bear Bottoms
Owner of Freeware website: http://bearware.info

Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.

Quoted text here. Click to load it


Huh! You are out of your mind and you are looking for nothing else but an
argument.

Besides some of those sites listed on your page is pirated material and your
page
shows as infected at least to my server system. Big Pop Up warning of this when
your
page is opening. No Bullshit on this. Maybe you should look into removing the
questionable links in it

--
Peter
Please Reply to Newsgroup for the benefit of others
Requests for assistance by email can not and will not be acknowledged.
This posting is provided "AS IS" with no warranties, and confers no rights.
http://www.microsoft.com/protect



Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.


Quoted text here. Click to load it

I'm not an amatuer; and I'm simply stating a fact with regard to his post
having no relevance in alt.comp.anti-virus. Go recommend kaspersky nod32
again, retard.
 



--
Stupidity isn't a crime. So you're free to go.

Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.

Quoted text here. Click to load it

It's *encrypted* with the key until it is decrypted with the key - why
can't you understand that simple fact?

Quoted text here. Click to load it

It gets decrypted with the key, it is not a matter of choice.

I think you should try to understand how encryption works before delving
into other things.

[...]

Quoted text here. Click to load it

What crosspost, are you trying to say that you multiposted this question
to other groups?

...bad form.




Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.


Quoted text here. Click to load it


| It's *encrypted* with the key until it is decrypted with the key - why
| can't you understand that simple fact?

Quoted text here. Click to load it

| It gets decrypted with the key, it is not a matter of choice.

| I think you should try to understand how encryption works before delving
| into other things.

| [...]

Quoted text here. Click to load it

| What crosspost, are you trying to say that you multiposted this question
| to other groups?

| ...bad form.

Yes FTR, he Multi-Posted this.


--
Dave
Multi-AV Scanning Tool - http://www.pctipp.ch/downloads/dl/35905.asp



Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.

Quoted text here. Click to load it

Is he trying to find out how many kinds of 'idiot' he can be at once?



Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.


Quoted text here. Click to load it

Small wonder this group died.

--
Bear Bottoms
Owner of Freeware website: http://bearware.info

Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.

Quoted text here. Click to load it

It died?

Are you familiar with Ray? Ray is trolling, but this time, in this
group, he actually seemed civil and didn't crosspost.

I answered his question despite the fact that he knows that it is off
topic for this group. We've answered general security questions here
before, there is not always a clear boundary between virus and security.
He has not exactly ingratiated himself with this group by insulting
those he expects help from.

If he understood encryption alone, he wouldn't even need to ask this
question.



Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.

wrote:
Quoted text here. Click to load it

You are an idiot.  First, don't insult me, a programmer in advanced
languages like C#, when you don't do anything more fancy that DOS
batch file coding.  Second, you don't seem to understand HTTPS at
all.  FYI, you need to have HTTPS capability in order to do you
"encrypting".  Do you think every site has this capability?  No.
That's why I say what I say in step #2: "2.  when the data (encrypted
via HTTPS as in step 1) gets to the anonymizer company's servers, one
of two things must happen.  First, either the ultimate destination
must support HTTPS (by ultimate destination I mean say you want to
connect to Facebook), or, the anonymizer company's servers must
decrypt from HTTPS and send your data to the ultimate destination
unencrypted.  In this second case, everybody inbetween the
anonymizer's servers and the ultimate
destination can read your data, but at least your ISP or hotel hotspot
could not. "

Did you read that and understand it?  I doubt it. Because if you did,
you would realize that most sites do NOT support HTTPS.  So in fact a
program like Steganos Internet Anonym only protects you from your ISP,
not from most sites.  That is, only the big sites like Facebook,
Yahoo, MSN Hotmail, etc support HTTPS (for one thing, you have to buy
a certificate and it's expensive, or at least not a trivial cost).
The other sites will receive your message in plaintext.  Only, as I
said before, your ISP will not be able to read your message.  But from
Steganos servers to your ultimate destination, everybody else can read
your message, unless your message is going to one of the big portals
like Facebook, Yahoo, MSN Hotmail, etc.


Quoted text here. Click to load it

You fail to understand the issue, clearly.  You seem to think I'm
talking about the mechanics of public key encryption used in HTTPS.  I
am not.  Go and lern something little man before calling others
stupid.

Quoted text here. Click to load it

Go lern retard.

Quoted text here. Click to load it

Like your out of shape couch potato body.

RL

Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.


wrote:
Quoted text here. Click to load it

You are an idiot.  First, don't insult me, a programmer in advanced
languages like C#, when you don't do anything more fancy that DOS
batch file coding.

***
You are a first class idiot. Ignorant of how the things that you propose
to know all about, work.

You own questions prove that.
***

  Second, you don't seem to understand HTTPS at
all.  FYI, you need to have HTTPS capability in order to do you
"encrypting".  Do you think every site has this capability?  No.
That's why I say what I say in step #2: "2.  when the data (encrypted
via HTTPS as in step 1) gets to the anonymizer company's servers, one
of two things must happen.

***
*One* thing must happen, it must be decrypted - only the session is
encrypted because HTTPS is a TLS implementation. You share a common key
with their HTTPS server so that they can accomplish this. Like I said
before, it is about the string, not the cans.
***

  First, either the ultimate destination
must support HTTPS (by ultimate destination I mean say you want to
connect to Facebook), or, the anonymizer company's servers must
decrypt from HTTPS and send your data to the ultimate destination
unencrypted.  In this second case, everybody inbetween the
anonymizer's servers and the ultimate
destination can read your data, but at least your ISP or hotel hotspot
could not. "

Did you read that and understand it?

***
Yes, but it depends only upon the deal you made when the handshake took
place between you and the server offering the HTTPS service. Once it
gets there, it *is* decrypted using the common key created as a result
of that handshake. It doesn't matter how many hops skips and jumps it
takes to get there, once there - it *is* decrypted.
***

[...]

Quoted text here. Click to load it

You fail to understand the issue, clearly.  You seem to think I'm
talking about the mechanics of public key encryption used in HTTPS.

***
It's not, public key encryption is used in the key exchange, a faster
cipher is used for the actual session.
***

I am not.  Go and lern something little man before calling others
stupid.

***
Stop *being* stupid, and I will stop calling you stupid.
(I thought you liked insults)

You seem to think that there is a choice being made by a server you had
an HTTPS session with as to whether or not they want to decrypt your
data. If you understood how it worked, you would know that there is no
such choice being offered - it gets decrypted - that's why you made the
deal. If further HTTPS sessions are needed it will get re-encrypted
using different secrets exchanged in new handshakes.

It protects the session, not the data.
***




Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.

wrote:

Quoted text here. Click to load it

Nope.  You *still* don't get it.  I'll try and make it as foolproof as
possible, though I doubt it will help.

User's computer is "A". ISP / gateway that user's computer uses to
connect to internet is "B"  Steganos Anonym server is "C".  Endpoint
user wants to connect to is "D".

Using Steganos Anonym you get a guaranteed HTTPS handshake between
points:  A,B,C guaranteed.  By that I mean: Steganos is saying you
will get HTTPS between these endpoints.  But not all endpoints
(computers) D have HTTPS.  This is a fact that you don't seem to
understand, with your 'string theory'.  We are not talking TLS
mechanics here.  Joe's Hardware website will not have HTTPS unless Joe
has paid for it.  MSN, Hotmail, Facebook will.  This is your stumbling
block, get over it.  Unless you are a pimple faced teen that is just
here to flame and not lern.  Your choice.  So the last hop from C <-->
D may or may not be HTTPS.  Steganos own documentation says this (see
OP).  Of course--and this is one value of Steganos Anonym software--
site D will think you, user A, are in fact a server C hosted by
Steganos.  This is valuable.  In fact, using an earlier version of
Steganos Anonym years ago, I once used this to trick a site that only
accepted USA IP addresses for certain transactions (I'm posting from
outside the USA) into talking to my computer.  Steganos is a good
service but last I used it, it was a subscription service that only
lasted one year.  But even at around $100 it was worth it for this
particular US-only site since I was able to buy their product at US
prices, which was much less than their non-US price by more than $100.

I came here hoping to confirm this simple fact rather than have to
teach you so-called experts.  A classic case of the student knowing
more than the teacher.

Now please go back to talking about your beloved viruses.  After this
exercise I wonder whether you even know what you're talking about
there.

Have a nice day.  Likely my last post in this thread unless somebody
can advance this discussion with more knowledge than what you've shown
so far.

RL

Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.


On Mon, 22 Nov 2010 00:44:26 -0800 (PST), RayLopez99

Quoted text here. Click to load it

Here's hoping...


Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.

On 11/22/2010 12:02 PM, James Egan wrote:
Quoted text here. Click to load it
How about extending that promise to ALL threads.

Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.


Likely my last post in this thread

***
Promises, promises.
***



Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.


User's computer is "A". ISP / gateway that user's computer uses to
connect to internet is "B"  Steganos Anonym server is "C".  Endpoint
user wants to connect to is "D".

Using Steganos Anonym you get a guaranteed HTTPS handshake between
points:  A,B,C guaranteed.

***
Wrong, you could get a handshake between A and C (AC) in which case B
would become irelevent.

If you wanted B to be relevent, and still communicate from A to C
through B then you would require two handshakes AB then BC and B would
then be working with unencrypted data.
***



Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.

wrote:
Quoted text here. Click to load it

Wait we have a disconnect here, literally and figuratively.  All data
must pass through B's servers, do you agree?  All data.  Whether
encrypted or not.

What you are saying is that if B needs to take a peek at the data, say
it's a web method that needs input from B, obviously B has to decrypt
it.  But how can A and C do a handshake unless A's data passes through
B?  A is a customer of B.  A uses a DSL modem to communicate with B's
servers (here, OTENET, the national carrier of Greece), then B
forwards any data from A to the world wide web.  Am I missing
something?

RL

Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.

wrote:
Quoted text here. Click to load it

Wait we have a disconnect here, literally and figuratively.  All data
must pass through B's servers, do you agree?  All data.  Whether
encrypted or not.

***
Yes, but it is irrelevent to the TLS/SSL that was implemented for the
HTTPS session. To them, packets with encrypted data are the same as
packets with non-encrypted data. If the deal (handshake) was between A
and Z and passes through all of the other letters of the alphabet (I can
list them for you if you need), they may all handle the packets but only
the Z server will be able to decrypt them (and *must* decrypt them)
before being passed to the next layer.
***

What you are saying is that if B needs to take a peek at the data, say
it's a web method that needs input from B, obviously B has to decrypt
it.

***
Yes, in which case you would have to have a AB handshake followed by a
BC handshake if the final destination is C.
***

 But how can A and C do a handshake unless A's data passes through
B?  A is a customer of B.

***
A requests that C use HTTPS, that request goes through B like any other
packet would. C gives A (through B) the necessary items (C Public key
and random#) to set up the encrypted session, they share secrets
(assymetric key encrypted) and calculate a  common symmetric key to use
against the data.
***

A uses a DSL modem to communicate with B's
servers (here, OTENET, the national carrier of Greece), then B
forwards any data from A to the world wide web.  Am I missing
something?

***
No, that's about it.

Think of it like this. If you want to conceal (cover) your data
documents from prying eyes you can encrypt your data, if you want to
conceal your communications session from prying eyes use TLS - for
instance TruCrypt covers your data (like your documents) and TLS covers
your session (like telling your anon server your password so you can log
on). After logging on, you may want to send data to the police
department server without allowing the anon server admin to view
plaintext (uncovered) documents - in which case you will want to cover
the documents as well. The anon service will forward your packets to the
police server while modifying the IP address so that you can't be traced
back without the cooperation of the anon server admin. The police server
may or may not support HTTPS which means that your traffic can be
sniffed (the IP is already essentially bogus) but at least your data
(documents) are still covered. You would have had to give the police a
TruCrypt key to decipher the documents.

It's confusing, but this scenario comes about because you might trust
the police with the information (give them a key) while you don't trust
them with your true identity or the way your identity could be deduced
from you *real* IP and account information *and* you don't trust the
anon service's admin with the documents. These things all operate
independently of each other.
***




Re: How do anonymous VPN work? Simple words, but not too simple. A proposed answer here.


Quoted text here. Click to load it

"Your" the student here?  "Your"?  You're really are dumb to be acting
as a grammarian.  Dumbass.

RL

Site Timeline