• cum@lemmy.cafe
    link
    fedilink
    English
    arrow-up
    47
    arrow-down
    2
    ·
    1 hour ago

    What is he talking about, public WiFi can easily poison and monitor your DNS requests (most people don’t know or use encrypted DNS), and there’s still tons of non-https traffic leaks all over the place that are plain text. Even if encrypted, there’s still deep packet inspection. VPNs can mitigate DPI techniques and shift the trust from an easily snoopable public WiFi to the VPN’s more trustworthy exit servers.

    This guy really needs to elaborate on what he’s trying to say when the cyber security field very much disagrees with this stance. I’m not a huge fan of Proton, but they aren’t doing anything wrong here. You should use it for public Wi-Fi.

    • asdfasdfasdf@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      1
      ·
      edit-2
      1 hour ago

      How is DPI a problem if it’s encrypted? That would only work if the attacker had installed their CA cert on your client machine, right?

      • orange@communick.news
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        27 minutes ago

        I think it might be confusion between inspecting plaintext metadata like SNI vs actually inspecting encrypted contents (e.g. HTTPS content, headers, etc.).

      • henfredemars@infosec.pub
        link
        fedilink
        English
        arrow-up
        5
        ·
        43 minutes ago

        I’m doing DPI on my own network and I can still view TLS certificate fingerprints and some metadata that provides a good educated guess as to what a traffic flow contains. It certainly better that it’s encrypted, but there is a little information that leaks in metadata. I think that’s what was meant.

  • priapus@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 hour ago

    This was nothing more than a poorly executed joke from Proton. Some people are massively overreacting.

  • m-p{3}@lemmy.ca
    link
    fedilink
    English
    arrow-up
    39
    arrow-down
    1
    ·
    edit-2
    2 hours ago

    Considering how most of the Internet is encrypted with TLS, if you add DNSSEC+DoH/DoT on top, trying to MITM someone on a public WiFi is way harder than it was, unless you’re a state-level adversary and you’re able to craft valid certificate for a domain you don’t control from a globally trusted (root) certificate autority (which will lose its trusted status quite fast once discovered, ex: CNNIC)

    • hamsterkill@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      17
      ·
      2 hours ago

      Not all applications on your computer may be encrypting their packet traffic properly, though. That goes especially for the applications that might be trying to reach out for resources on your local home network (like printers, file shares, and other home servers) as well as DNS requests which are usually still made in the open. I would not recommend eschewing an entire security layer willy-nilly like that. On public Wi-Fi, I would definitely still suggest either a VPN or using your cell phone as a tether or secure hotspot instead if possible.

      • MimicJar@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        1 hour ago

        Sure, but it’s also like, if you’re stepping away from your laptop for a few minutes should you lock the screen or shut it down completely.

        The most secure option is to shut it down completely, but also it’s fine to just lock your screen.

        If you’ve already got a VPN and it’s as easy as locking your screen to enable, go for it, use it. But if you don’t, you don’t need to go out and get one. You’ll generally be ok without one.

    • linearchaos@lemmy.world
      link
      fedilink
      English
      arrow-up
      24
      ·
      2 hours ago

      Yeah, the days of your local coffee shops Wi-Fi being a problem or mostly gone. Not the VPN doesn’t have a place anymore though. If you’re trying to hide your downloading of ISOs from your ISP it’s still a perfectly reasonable method. Or temporarily relocating yourself to another country to make a purchase or watch some streaming content both perfectly reasonable.

      Of course some of the streaming providers are getting wise to this.

          • Warl0k3@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            43 minutes ago

            It’s all fun and games until a Microsoft Purity Enforcement squad is kicking in your door.

            • linearchaos@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              39 minutes ago

              Nah, it’s all good I subscribe to Linus Torvalds protection services. When the Microsoft vans get within four blocks of my address, They’ll drop ship in dozens of fully-armed penguin paratroopers. After the incursion they even send in a penguin based cleaner team to help get rid of the remains.

        • linearchaos@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 hour ago

          Yeah, pptp will always have a strong purpose and home. I’m more speaking to the viability of commercial anonymization VPN.

  • RegalPotoo@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    3
    ·
    1 hour ago

    The only real use case for VPNs is to bypass geo blocking on streaming sites, and the VPN providers know this. They also know that if they lean too hard into that, eventually someone will sue them and their business model will evaporate - so they add the “iT MaKEs yOu mORe SeCurE” nonsense as a fig leaf so they can say with a straight face that they operate a product with legitimate uses

  • chagall@lemmy.world
    link
    fedilink
    English
    arrow-up
    20
    ·
    3 hours ago

    This was poorly executed. The National Park Service twitter account does jokes well.

  • LEDZeppelin@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    30 minutes ago

    Taking cybersecurity advice from someone called Hawk Tuah is modern day version of clicking banner that says find 40+ single women in your zip code