Description
Two security researchers showed how many modern VPN services are vulnerable to malicious misconfiguration, exposing some or all of your internet traffic. While this is not likely to impact most of us, it does expose the limitations of Virtual Private Networks and why they are not silver bullets for security of privacy - despite many marketing claims to the contrary. Today we'll discuss how TunnelVision works, how it can be mitigated, and how this affects different privacy threat models with the two researchers from Leviathan Security, Dani Cronce and Lizzie Moratti.
Interview Notes
Lizzie Moratti: https://www.linkedin.com/in/lmoratti/
Dani Cronce: https://www.linkedin.com/in/danicronce/
TunnelVision: https://www.tunnelvisionbug.com/
ProtonVPN threat model: https://protonvpn.com/blog/threat-model
Dani’s GitHub: https://github.com/superit23
Leviathan Security blog: https://www.leviathansecurity.com/blog
Veilid: https://veilid.com/
Willy Wonka scene: https://www.youtube.com/watch?v=pvS3j8VtanM
Linux network namespaces: https://blog.scottlowe.org/2013/09/04/introducing-linux-network-namespaces/
What is DeFi? https://www.investopedia.com/decentralized-finance-defi-5113835
Further Info
Help me brainstorm ways to reach more people!: https://fdsd.me/awareness2
Send me your questions! https://fdsd.me/qna
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Subscribe to the newsletter: https://fdsd.me/newsletter
Become a patron! https://www.patreon.com/FirewallsDontStopDragons
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Support our mission! https://fdsd.me/support
Generate secure passphrases! https://d20key.com/#/
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:01:23: Reminder: brainstorming survey
0:01:47: Podcast chapter markers!
0:02:54: Interview setup
0:05:55: What is a VPN and what isits intended purpose?
0:10:27: If most connections are secured today, why do we need a VPN?
0:12:40: Why do we trust a VPN provider more than our internet access provider?
0:17:40: What are you trying to do with a VPN?
0:19:13: Who can see my internet traffic?
0:25:30: What is TunnelVision and what are the implications for VPN users?
0:29:42: What's a less technical way to understand TunnelVision?
0:33:06: Why might I not want all my traffic to go through the VPN?
0:35:02: How dangerous is TunnelVision for the average person?
0:42:30: How did the VPN companies respond?
0:51:19: What VPN features can mitigate the risk?
0:57:42: Have any VPN makers fixed this problem? Do OS vendors have responsibility here?
1:02:11: Do you have recommendations for VPNs? Is there new tech that might help here?
1:04:00: Would privacy regulations help here?
Holiday shopping season is here! And today I'll give you the highlights of my annual Best & Worst Gift Guide for 2024, with regard to privacy and security. The worst offenders may not surprise you, though some have actually gotten worse since just last year. And I have a few new suggestions...
Published 11/18/24
Device manufacturers are breathing new life into old mundane products by connecting them to the internet, giving us the ability to monitor and control them from anywhere. However, this connection to the cloud works both ways. Not only do device makers now have unprecedented access to our usage...
Published 11/11/24