![]() The company may also look for help from digital rights and privacy organisations to see what it can do from a legal perspective, but for now, the company is waiting for the release of more detailed and technical documents so it can figure out the extent of the NSA’s targeting. “It was more popular on mobile devices because of the ease of configuration, but basically, most of the traffic goes through OpenVPN and most users are Windows users.” “We were warning users that it doesn’t ensure confidentiality so they should only use it for video streaming or other applications where confidentially isn’t that important,” Luczywo. While a small number of its users availed of it – less than 5% according to Luczywo – it was alerting customers that using it didn’t ensure confidentiality and to use OpenVPN and end-to-end encryption if they needed secure communications. Recently, the company had to discontinue its PPTP (Point-to-Point Tunneling Protocol) service as the connection method had been compromised by the NSA. While SecurityKiss doesn’t use usernames and passwords for OpenVPN – instead it uses the individual private keys and certificates embedded in the programme which means the basic NSA attack of stealing keys can’t be used as they’re not in the activation email – the company isn’t ruling out the possibility of other attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |