A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. Everyone is using VPN according to their needs. Businesses use VPNs to connect remote datacenters, and individuals can use VPNs to get access to network resources when they’re not physically on the same LAN (local area network), or as a method for securing and encrypting their communications when they’re using an untrusted public network.
How it works
A VPN works by routing your device’s internet connection through your chosen VPN’s private server rather than your internet service provider (ISP) so that when your data is transmitted to the internet, it comes from the VPN rather than your system. The VPN acts as an intermediary of sorts as you connect to the internet, thereby hiding your IP address – the string of numbers your ISP assigns your device – and protecting your identity. Furthermore, if your data is somehow intercepted, it will be unreadable until it reaches its final destination.
A VPN creates a private “tunnel” from your device to the internet and hides your vital data through something that is known as encryption.
syncmedia1 said:
Spoiler
A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. Everyone is using VPN according to their needs. Businesses use VPNs to connect remote datacenters, and individuals can use VPNs to get access to network resources when they’re not physically on the same LAN (local area network), or as a method for securing and encrypting their communications when they’re using an untrusted public network.
How it works
A VPN works by routing your device’s internet connection through your chosen VPN’s private server rather than your internet service provider (ISP) so that when your data is transmitted to the internet, it comes from the VPN rather than your system. The VPN acts as an intermediary of sorts as you connect to the internet, thereby hiding your IP address – the string of numbers your ISP assigns your device – and protecting your identity. Furthermore, if your data is somehow intercepted, it will be unreadable until it reaches its final destination.
A VPN creates a private “tunnel” from your device to the internet and hides your vital data through something that is known as encryption.
Click to expand...
Click to collapse
@syncmedia1 Please check your private messages / conversations. Thanks very much!
Regards
Oswald Boelcke
Related
I'd like to be able to deploy a lightweight web server on my mobile device (android 2.1) but there are obviously NAT issues with respect to the mobile provider's network. Is there anyway I can make my device publicly available/addressable over the internet?
Thanks
as far as i know you cant, the service provider will assign each device a private address, it can only go online through their own NAT services, the phone will connect to any GSM Service providers signal distributors.
the only public IP available would be the Signal Distributors, and I doubt very highly your service provider would go through the trouble of assigning your phone a static private IP and then Port forwarding to your phone.
you can do this over WIFI without trouble you just need webservices running on the phone.
as far as i know there is no direct way of connecting to your mobile phone using a public IP Address
Hi,
Here’s my situation – at my office they use Cisco IronPort to monitor and filter all internet requests. A transparent proxy is used on the network switches to direct port 80 traffic to the IronPort server. Initially only the browser on my phone would work as that is the only app that passes the correct authentication. All other apps fail to reach the internet. But the IronPort server can be configured to pass through a type of device if it can be identified. Using the IP address of my phone to filter the traffic logs, it seems that some apps pass “Windows Phone OS” in the data packets. And by adding “Windows Phone OS” to the IronPort exception list, those apps now work. But most apps still don’t work because they don’t include any windows phone identifier in the data packets. Can anyone provide any additional info on this subject or a possible solution?
Thanks.
bump... any ideas... anyone?
Use cellular data instead of your corporate network?
Use apps that use the new socket APIs, or connect to HTTP servers running on a port other than 80?
Complain to your IT people (commoditization of IT being what it is, I'm actually surprised by this restriction)?
See if you can get them using proxy authentication instead of packet inspection for authentication purposes (WP7 supports proxy authentication on WiFi)?
Find a job with an IT infrastructure that doesn't suck?
If you connect your android device or computer to a VPN provider (for example, private internet access vpn), can the VPN provider look at what's on your computer or android device? It seems like when you use a VPN server, data goes through there and VPN provider can essentially look at those data if its not encrypted. So, can VPN provider have access to your computer system because you are directly connected to their server?
I want to set my Mum's new tablet so that it can only access the Internet via the SSH server running on her Buffalo router (with Tomato firmware).
I've got the server working and accessible remotely and so far the only app I've found that has a Global Proxy setting to redirect everything via the SSH server is SSHTunnel, although I gather that it's not totally reliable when connections drop/change and I can't expect my Mum to cope with monitoring it and re-enabling it manually. When it's disabled, all traffic will just go over local connection unencrypted so that's a concern.
Ideally there'd be some way to setup the SSH settings at a system level, with no way to disable them and force all the traffic go out like this but I'm not sure if there is any way to achieve this.
The other part is setting a firewall (AFWall+ or Android Firewall seem to be the main ones) to only allow traffic via the SSH server. I'm not sure what whitelist rules would be required for this. For example, SSHTunnel connects to the server at x.x.x.x:x, so I presume I'd need a rule to allow connections to this address and this port (I had a quick play with the Avast firewall, which only allows creating custom rules for IP or port, so I'd need two rules with that and it doesn't allow entering the DynDNS name, only a IP address, so that's no good).
Then SSHTunnel has a Local Port (1984) and remote addressort (127.0.0.1:3128) so I presume I'd need rules to allow all of those as well (I'm not sure which of these need to be incoming/outgoing or both). Then there's the question of whether I need to allow other ports like DNS (53) and so on, or if that all goes over the SSH tunnel and doesn't require setting allow rules specifically.
It might be that a VPN server would be more suitable for what I'm trying to acheive than a SSH server and I think the Tomato firmware on the router has that facility (or if the version currently flashed doesn't, there's probably another version I could flash that does), so if that's the case, I'd appreciate advice on locking it down that way instead. Android has built-in VPN support, so it might be possible to use that but it depends on whether it will auto-connect and stay connected all the time or if it requires user intervention and I'll still need to setup firewall rules to prevent data being sent without the VPN in case it does get disabled.
Another issue is whether these firewall rules will prevent the device even being able to connect to any public Wi-Fi points before redirecting the traffic via the SSH/VPN server, which would obviously be no good.
OK, maybe there's another way
I was thinking of setting up a VPN on a Raspberry Pi installed at my parent's house, as they have reasonable broadband speeds, something like 100/10MB. Is there anyway that I could setup my Mum's tablet so that it passes everything through the VPN whether at home or away, so that she doesn't have to worry about toggling the VPN or firewall?
I can point it to the No-IP domain name I've setup but then I think every request would go out onto the Internet (albeit encrypted) before coming back in to the VPN, which would then have to go out again to retrieve whatever webpage, etc is being requested, which would obviously be stupid. If I point it to the LAN IP of 192.168.1.66, that will avoid doing that when at home but won't work when away.
So, any ideas?
Scenarios:
Using the phone offline while having a simcard attached to the phone. (Assumption: due to celltower tracking, the location of the carrier is constatnly monitored)
Connecting to wifi and having simcard attached to the phone while using a vpn. (Assumption: the vpn is useless because the real location is still trackable via celltower)
Connecting to wifi without a simcard while using a vpn. (Assumption: real location should be hidden because of the vpn and the lack of a simcard)
Connecting the phone to internet via ethernet-cable while using a vpn. (Assumption: real location should be hidden because of the vpn and the lack of a simcard)
While i'm sure that my assumption for the first two scenarios is accurate, i'm confused about the last two, what's the difference between connecting via wireless-wifi or ethernet-cable in terms of geolocation tracking, could the true location still be tracked in the first example (using a vpn over wifi without a simcard)?
Wi-Fi Location Tracking: How Does It Work?
Wi-Fi location tracking is a system created to locate devices in areas where GPS doesn't work as well. Read our article for the full story.
vpnoverview.com
Interesting.
Now i'm confused if using a vpn prevents sites from determing my real location based on the wifi-router/modem.
Don't confuse things:
A SIM card ( full form: Subscriber Identity Module or Subscriber Identification Module ) is an integrated circuit (IC) intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and laptops).
Wi-Fi is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves. These are the most widely used computer networks in the world, used globally in home and small office networks to link desktop and laptop computers, tablet computers, smartphones, smart TVs, printers, and smart speakers together and to a wireless router to connect them to the Internet, and in wireless access points in public places like coffee shops, hotels, libraries, and airports to provide visitors with Internet connectivity for their mobile devices.
A VPN ( full form: Virtual Private Network ) is a mechanism for creating a secure connection between a computing device and a computer network, or between two networks, using an insecure communication medium such as the public Internet. VPNs are mostly absused to bypass internet censorship. Encryption is common, although not an inherent part of a VPN connection. VPNs cannot make online connections completely anonymous, but they can increase privacy and security. VPN servers essentially act as your proxies on the internet. Because the demographic location data comes from a server in another country, your actual location cannot be determined.