Show HN: Responding to NSA spying with a simple consumer VPN service
Yes, it's based in the US, but there's a big difference between "will turn over data proactively" and "will push back on requests to the fullest extent of the law". Since we don't fall under CALEA, there's no requirement for us to have any monitoring infrastructure.
We're focusing on the mobile experience for iOS and Android -- the best combination of platform security but also difficult to "roll your own" service.
Would greatly appreciate HN's feedback on concept and implementation; still under active development. Posting some free signup codes in the comments to try it out.
https://privacy.cryptoseal.com/
[+] [-] 47|12 years ago|reply
It might be because of consumer grade router[1] have low computing power, but the speed is so low that I highly doubt it. Yes I have tried multiple VPN providers.
I have yet to find a VPN provider that can provide all of the following:
- Guarantee Bandwidth
- Take Privacy Seriously[2]
- Support consumer grade router (with DD-WRT or alternative)
- Do not cost more than my actual internet connection
[1] ASUS RT-N16
[2] http://torrentfreak.com/vpn-services-that-take-your-anonymit...
[+] [-] Spittie|12 years ago|reply
For anyone interessed, https://github.com/Nyr/openvpn-install makes installing OpenVPN a breeze. For VPS deals, http://www.lowendbox.com/ and http://vpsboard.com/.
[+] [-] thaumaturgy|12 years ago|reply
I've been using one of these, bought with Bitcoin, via Coinbase, set up with a Hushmail account, for a while now. It works great. Bandwidth is diminished somewhat, but not enough to be a problem for normal browsing or other totally legal activities.
edit: I'm tired, just noticed you linked to essentially the same TF article I did. Anyway, the service I've been using works with Tomato and DD-WRT (on some routers), is affordable, and is on of the recommended services for taking privacy seriously. They don't guarantee bandwidth, but in practice, there hasn't been a problem so far.
[+] [-] bifrost|12 years ago|reply
A fair amount of that has to do with how little CPU is available on your router device, I suspect no manufacturer will support a device that can do a lot of crypto and still be in the consumer price range.
That said, I could ship you a device right now that'll do 100Mbps of encrypted traffic all day long, but it doesn't have wifi and its about $500...
[+] [-] rdl|12 years ago|reply
Testing various consumer routers with VPN for performance is on my todo list. I know the WRT54GL is probably fairly antiquated at this point, but I have some newer DD-WRT supported routers like the WNDR3700 to try.
[+] [-] buro9|12 years ago|reply
I've just purchased an Asus RT-N66U to run an OpenVPN client so that I can encrypt the traffic from all computers, and as I don't do file-sharing I've focused on choosing a provider obsessed by privacy rather than piracy. IVPN looks like it, but I haven't yet tried it so don't yet know how it will perform.
[+] [-] a3n|12 years ago|reply
[+] [-] rdl|12 years ago|reply
[+] [-] btgeekboy|12 years ago|reply
[+] [-] lifeguard|12 years ago|reply
[+] [-] richardwhiuk|12 years ago|reply
[+] [-] rdl|12 years ago|reply
PRISM is somewhat ambiguous -- maybe it's a huge secret program where they get blanket access to big sites directly, maybe it's just a UI layer for managing subpoena or warrant results.
Protecting your metadata is one thing where a VPN works pretty well. There are still some more advanced attacks (looking at the encrypted traffic flows on lightly loaded links, you can infer what site/activity one is doing, even without decrypting, unless you pad all communications).
[+] [-] prayag|12 years ago|reply
[+] [-] prayag|12 years ago|reply
I also love the fact that they have servers outside of the US, makes it a little bit harder for the US government to spy on you.
[+] [-] rdl|12 years ago|reply
It would be ironic if the NSA fiasco ended up accomplishing half of the NSA's mission (protecting domestic networks) by getting everyone to improve security and encrypt-by-default, at the cost of making the NSA's SIGINT mission vastly more difficult.
[+] [-] rdl|12 years ago|reply
[+] [-] jvandenbroeck|12 years ago|reply
Or how is your product easier to use?
[+] [-] thaumaturgy|12 years ago|reply
One of the major issues that has been raised recently is, essentially, trust. Especially in the market that you'd be targeting -- individuals that no longer trust various online services.
You can say that you will fight requests as much as possible under law, but how is that different from what Google, Facebook, and others claim to do?
The NYTimes just published an article claiming that Skype was backdoored by the NSA in cooperation with a small team of Skype developers, in secret, back in 2011. For the sort of people that are concerned by that sort of news, how are you going to convince them that you're different?
[+] [-] B0Z|12 years ago|reply
[+] [-] rdl|12 years ago|reply
For now I'd like to think we're more trustworthy than a large/general purpose company because we have a lot less to lose in fighting (and much more to gain).
[+] [-] B0Z|12 years ago|reply
I've been a ViprVPN customer before. I had a question or perhaps it was an issue I called them about and the person I was communicating with told me what VPN server I last connected to and when I connected. Sure, to do any kind of troubleshooting, this would have been necessary and important information. But I was concerned enough about the unsolicited disclosure that I cancelled the service immediately.
DuckDuckGo can claim a reasonably high interest in protecting my privacy because they simply do not collect data that the big search engine does. Collecting and storing this data would make them a target for undisclosed, unchallengeable, and unwarranted surveillance. This has enormous appeal to me.
Having said that, have you guys discussed (loosely) what data you will be collecting?
[+] [-] rdl|12 years ago|reply
For a $5-10/mo VPN, we're probably going to handle most problems by "open a new account, here's a service credit", so we don't actually need to debug much. We have a vested interest in collecting the minimum information possible so there's no point in subpoenaing it from us.
[+] [-] kumarski|12 years ago|reply
[+] [-] Estragon|12 years ago|reply
[+] [-] davepeck|12 years ago|reply
[+] [-] epoxyhockey|12 years ago|reply
[+] [-] rdl|12 years ago|reply
We're working on some things which will make it compelling to switch. We put it up now because a lot of people don't have VPNs today -- so hopefully adding another provider convinces some additional people they could use a VPN.
[+] [-] B0Z|12 years ago|reply
[+] [-] rdl|12 years ago|reply
1) What platforms do you care about? Do you mainly need service from one fixed location, or from home/office network plus mobile?
2) How close does it need to get to the endpoints? We have 4 exit nodes right now; we'd probably need ~50+ to be very close to most services. There's still a portion which is "in the clear" (although, use https...), but it becomes very impractical for NSA or especially others to passively tap all those locations (since they wouldn't be IXes necessarily, and intra-colo links don't get routed through buildings like ATT 611 Folsom St.
[+] [-] smegel|12 years ago|reply
[+] [-] rdl|12 years ago|reply
The privacy VPN itself currently does zero logging. The best practices seem to be either zero logging or very short retention logging. We'll commit to one of those (but most likely zero logging) soon (working on a very clear and plain language ToS). All the stuff we'd handle with logging is instead done by going out to top-500 sites (or anything reported to us as not working), rather than monitoring use.
We don't currently do "anonymization" so web browsing can be an issue. We're looking at that with some kind of opt-in proxy.
[+] [-] buro9|12 years ago|reply
[+] [-] rdl|12 years ago|reply
[+] [-] prg318|12 years ago|reply
[+] [-] rdl|12 years ago|reply
A (current and historical) performance monitor, uptime monitor is a great idea.
[+] [-] bifrost|12 years ago|reply
We currently monitor 60+ sites from the Alexa Top 500 for load time and loss so we can use the data for capacity planning and fault isolation.
[+] [-] bliker|12 years ago|reply
[+] [-] rdl|12 years ago|reply
[+] [-] alex_doom|12 years ago|reply
[+] [-] rdl|12 years ago|reply
The issue is that "TCP in TCP" can lead to weird interactions where you delay one packet, wait for retransmit, etc., and essentially a single packet lost can eat up a second or two.
In general I'd always try UDP, and if it doesn't work, fall back to TCP.
They're equivalent security -- it's just network performance.
[+] [-] jogzden|12 years ago|reply
[+] [-] davenull|12 years ago|reply