IP Protection in 2019: Cope with Weak Points
Some people prefer using Virtual Private Networks others opt for anonymizers. But not all tools cope with the task fair enough. We cover them all with both weak and strong sides.
IP Masking is relevant these days
Elias Heftrig, a worker of the Fraunhofer Institute for Secure Information Technology, has conducted research on Certificate Authorities’ weaknesses. Based on the research findings, 5 out of 17 CAs turned out to be vulnerable to a fragmentation attack of an IP. The result of the investigation was rather surprising for an average user, as IP masking is generally used to be protected when browsing restricted sites and services. But in fact, it goes much deeper than that.
Virtual Private Networks
VPN connection resembles the connection to a local area network: the applications you use will keep on working as usual. When one of them comes to a remote resource, a special GRE-package will be created on a device. Later, it’ll be encrypted and sent to a VPN server. In its turn, this server decrypts the package, identifies the request and makes it on its own behalf. Thus, third-party agencies will see the IP that belongs to a VPN provider but not to a user. The greatest benefit of VPNs (for instance, Trust Zone VPN), is the facility to make use of all their advantageous functions free of charge!
Proxy is a computer networks service which allows its consumers to make indirect requests to other network services. First, a user connects to a proxy server and requests a resource (for example, a file) located on another server. After it, proxy server connects to the necessary server, gets a resource and delivers it to the client. The IP of a user is masked again. HTTP-proxies are the most commonly used. They are used quite often but work with HTTP only.
An anonymizer looks like an average search engine with the only difference being that a user should enter a URL instead of a search request. Anonymizers represent scripts in PHP, PERL and CGI. Thanks to anonymizers, ISPs don’t see user’s IP and, therefore, the restricted content becomes unblocked.
The Onion Router
Tor is a system which allows users to connect to its servers anonymously. Besides, users’ traffic undergoes ciphering when passing through secured nodes. It is typified as an anonymous network which provides unidentified web surfing and safe data transfer. Due to Tor, internet users manage to keep anonymity when accessing websites, publishing information, sending messages, and working with other apps (based on TCP protocol). Traffic protection is provided by means of a wide-area network of servers called onion routers. The users of Tor network enable onion-proxy on their computers, and a virtual chain of free volunteer nodes uses the cryptography for data protection. Everything, including search requests, visited pages and IP, is hidden.
SSH-tunneling is similar to VPN. The operating principle is the following: traffic is forwarded to the assigned port of local hosting. The advantage of this technology is that no additional soft is required to be installed. One will also like the speed – it might become faster. This is due to the fact that traffic undergoes encoding and compressing.
It is a distributed peering network of computers which belong to volunteers all over the world. The network was worked out in order for users to bypass restrictions imposed by local ISPs. As a result, we surf the internet under third-party IP addresses.
Julia Sowells960 Posts
Julia Sowells has been a technology and security professional. For a decade of experience in technology, she has worked on dozens of large-scale enterprise security projects, and even writing technical articles and has worked as a technical editor for Rural Press Magazine. She now lives and works in New York, where she maintains her own consulting firm with her role as security consultant while continuing to write for Hacker Combat in her limited spare time.