Fast and Easy VPN top Service VIKING VPN
Media Partner All 3g hacking
====================
1. No. We run a zero knowledge network and are unable to tie a user to an IP address.
Media Partner All 3g hacking
====================
1. No. We run a zero knowledge network and are unable to tie a user to an IP address.
2. United States, they don’t have
data retention laws, despite their draconian surveillance programs. The
only information we share with anyone is billing information to our
payment gateway. This can be anonymized by using a pre-paid anonymous
card. If asked to share specific data about our users and their habits,
we would be unable to do so, because we don’t have any logs of that
data.
3. That is mostly confidential information. However, we can assure our users that we do not use logging to achieve this goal.
4. In the event of a DMCA notice,
we send out the DMCA policy published on our website. We haven’t yet
received a VALID DMCA notice.
5. We exhaust all legal options
to protect our users. Failing that, we would provide all of our logs,
which do not actually exist. If required to wiretap a user under a
National Security Letter, we have a passively triggered Warrant Canary.
We would also likely choose to shut down our service and put it up
elsewhere.
6. Yes. Those ports are all open, and we have no data caps.
7. We currently only take credit
cards. Our payment provider is far more restrictive than we ever
imagined they would be. We’re still trying to change payment providers.
Fortunately, by using a pre-paid credit card, you can still have totally
anonymous service from us.
8. A strong handshake (either
RSA-4096+ or a non-standard elliptic curve as the NIST curves are
suspect). A strong cipher such as AES-256-CBC or AES-256-GCM encryption
(NOT EDE MODE). At least SHA1 for data integrity checks. SHA2 and the
newly adopted SHA3 (Skein) hash functions are also fine, but slower and
provide no real extra assurances of data integrity, and provide no
further security beyond SHA1. The OpenVPN HMAC firewall option to harden
the protocol against Man-in-the-Middle and Man-on-the-Side attacks.
0 comments:
Post a Comment
enjoy free 3G tricks