viktorivpn

joined 1 year ago
MODERATOR OF
[โ€“] [email protected] 1 points 5 months ago

Ha! Author here - no LLM was used. It was an attempt to summarise the content and the key message, but it took some time to jam pack everything into two sentences.

 

With inverse split tunnelling only apps in the Split Tunnel list use the VPN connection. Learn more about this feature in our updated guide: https://www.ivpn.net/knowledgebase/general/split-tunnel-faq/

Full changelog: https://github.com/ivpn/desktop-app/blob/master/CHANGELOG.md

 

You can learn more about using v2Ray in the IVPN iOS app here: https://www.ivpn.net/knowledgebase/ios/v2ray/

Changelog:

[NEW] Obfuscation with V2Ray for WireGuard connections
[IMPROVED] Update WireGuard to the latest version
[IMPROVED] Update packages/dependencies to the latest version
[FIXED] Repeatedly connecting and disconnecting when 
Network Protection is enabled

https://github.com/ivpn/ios-app/blob/develop/CHANGELOG.md

 

Please note for this role we are only recruiting within the UTC-5 to UTC+7 timezones.

We are looking for a Technical Writer to create in-depth guides about privacy, information security and VPN use. We prefer quality over quantity, and aim for providing real value to our technical audience as opposed to churning out surface level, keyword stuffed content marketing posts.

To qualify for this role, credentials and number of years of experience does not necessarily matter, given you have a deep interest in privacy, come equipped with technical skills, and have a knack for writing. We offer flexibility, autonomy and just as much guidance as you need to succeed in this position.

This is a remote, part-time (20 hours per week) position with a possibility of switch to full-time depending on the progress of projects and your goals.

What you will work in the first 6 months:

Research and write articles and guides for technically proficient audiences on privacy and security topics, including, but not limited to: -- Threat modelling and advanced privacy threats -- ISP surveillance capabilities -- Practical anonymity and low latency networks -- VPN related technical concepts and issues -- Self-sovereignty and self-hosting

Updating and improving IVPN's Privacy Guides, with specific focus on Advanced Guides

Requirements You tick the following boxes and have:

  • Native level English.
  • Published information security or privacy related materials with a technical focus. Blog posts, guest posts, assignments, research papers qualify.
  • Strong interest in information security and privacy, with focus on end-user best practices, threat modeling and privacy tools

Nice to have:

  • Strong technical background, ongoing studies or degree in related field (e.g. information security)
  • Experience with advanced privacy and anonymity practices, eg. VPN chaining, virtual machines, QubesOS, Tor
  • Interest or experience in cryptography

Apply here: https://ivpn.recruitee.com/o/technical-writer-privacy-security-part-time

 

This is a timely reminder to all IVPN customers who have a Pro plan with Port Forwarding activated, on 30 September:

  • all previously open ports will be closed
  • port forwarding as a tab/feature will be removed from My Account and other areas of the IVPN website

Relevant links about this change:

  1. https://www.ivpn.net/blog/gradual-removal-of-port-forwarding/
  2. https://www.ivpn.net/refunds/
[โ€“] [email protected] 2 points 1 year ago (1 children)

All three Privacy Guides recommended VPNs have ad- and tracking-blocking built-in with varying degree of customisation options. This feature can cover the basic benefits a PiHole would give you. If you want more control, I would suggest testing a tool like NextDNS instead of PiHole which gives you a custom DNS address you can set with some VPN providers, offering smoother interplay.

 

TunnelCrack is the combination of two independent security vulnerabilities (LocalNet attack and ServerIP attack) that affect VPN applications. The research paper detailing these vulnerabilities was published and presented on 11 August 2023. IVPN apps were not tested by the researchers, and unlike other providers, we did not receive a vulnerability disclosure.

We have completed the assessment and investigation of the current IVPN applications on each platform we support. Below you can review the results of this process.

In summary:

  • iOS IVPN app was vulnerable to LocalNet attack, as LAN traffic was going outside the VPN tunnel by default when the VPN connection was active. This was identified as a consistent issue across all VPN providers assessed during the research.
  • Desktop and Android IVPN apps were potentially vulnerable to LocalNet attack, when local network traffic bypassing was enabled in the app (disabled by default).
  • Android app was potentially vulnerable to ServerIP attack, in an event of backend failure when OpenVPN protocol was used. The detailed assessment in the blog post covers the IVPN application versions in production at the time TunnelCrack details were released (Windows v3.11.15, macOS and Linux v3.11.14, iOS v.2.10.0, Android v.2.10.0). As highlighted after each section, all potential vulnerabilities were patched and released with the latest IVPN app versions released since then.

Full details: https://www.ivpn.net/blog/ivpn-tunnelcrack-vulnerability-assessment/

 

We have added Lemmy to our communication channels (Mastodon could be of interest here), and plan to post service related updates here. We are here to answer any queries, facilitate discussions about the service and hang out with privacy-minded Lemmy users.

About the service:

  • apps are open source
  • extensively audited
  • transparent ownership and team
  • no email address required
  • WireGuard on all major platforms
  • ad and tracker blocking
  • clear ethical guidelines
  • no surveillance ads (e.g. Facebook, Google)
  • no affiliate program
  • no third party tools
  • no trackers on website and in apps
  • you can pay with monero, bitcoin/LN or cash besides vanilla payment options

Website: https://www.ivpn.net
GitHub repos: https://github.com/ivpn
Our ethical standards (feedback welcome): https://www.ivpn.net/ethics
Clear privacy policy: https://www.ivpn.net/privacy
Transparency report: https://www.ivpn.net/transparency-report
Warrant canary: https://www.ivpn.net/resources/canary.txt