Category: technology

Hey Look, That’s Suspicious. Hide IP all Internet Traffic

One very important aspect of privacy that is usually overlooked is that of discretion.  If you want to remain private, then it’s important not to stand out – in IT circles it’s often called security by obscurity.   I remember once having to investigate unauthorized use of a database system by an employee.   The scenario was that this particular application could be used to look up all sorts of personal details about people however this was strictly  forbidden.

When I started to investigate, it took about 2 minutes from looking at the logs to identifying the culprit.  The logs were huge, but all access was identified by the user access name in one column.  The usernames were all in a long format like this –  user/2347643-1964 all except one whose username was Bob21 (slightly changed to protect the stupid), and it stood out a mile.  The user had created his own account and used it to look up details of a love rival, but had failed to keep to the same username format as everyone else.   It yelled – check me out, very loudly indeed – he was discovered and subsequently lost his job.

hide vpn traffic

The point is that it’s all very well having a super secure and encrypted connection, however if this is too obvious you run the risk of making yourself a target and inviting investigation.  This is particularly relevant in using a proxy or VPN or proxy to hide yourself online.  Sure they work and a properly configured VPN over port 80 does keep you very secure, however if anyone looks at the logs the VPN user can stand out.

The reason is that in standard ISP logs a normal web user will have a variety of internet requests to all sorts of different web servers and IP addresses.  The VPN user will have all those hidden and will interact with the single IP address of the VPN server.  This stands out, the same IP addresses being connected almost permanently and no requests made to anywhere else.  The IP address is either a fascinating web site or more likely a proxy or VPN – it’s also simple to search and filter for this sort of behaviour.

Fortunately it is possible to hide VPN traffic by using certain highly secure VPN services which can be made almost invisible too with a few carefully configured options.   Here’s an example of those settings that you can configure in Identity Cloaker.

Basically you need to ensure that you rotate the IP address you access periodically – so that a variety of addresses appear. This suggest normal web browsing rather than a single encrypted connection which can help to hide openvpn traffic too. Other options are to allow the cloaking of different applications, so that some requests go direct to the site whilst others are redirected through the VPN tunnel.

After all if you’re streaming video from a recognised site, do you need encryption? Is it a secret?  You might already run openvpn over https too, and by making this sort of behaviour accessible and readable you control what aspects of your online activity is private and which isn’t.   These are simple tricks but extremely useful if you’re serious about tying to hide VPN traffic properly.

It’s not that difficult if you have these options in your VPN service to melt back into the crowd. However it makes a huge difference to the level of privacy you enjoy. A little obscurity is an essential element in keeping yourself safe online, any security adviser knows all too well that you should avoid making yourself into a target.

 

How to Unlock More Movies on Netflix

One of the problems with Netflix is it’s just too big! Much is made of of it’s super clever algorithm which is designed to guide you to your favorite shows, however the reality is that most of us will never come across thousands of the shows and movies stored on there. Most of the versions of Netflix are the same but the US version has even more content with some estimates suggesting tens of thousands more films and TV shows. Here’s how to unlock more movies on Netflix using a simple hack.

So how can we browse all these films more easily, well some clever chap has discovered a way to break out of Netflix’s suggested movies mode and dive straight into specific categories.

It turns out that you can go straight to thousands of pre-defined categories on Netflix just by using the correct URL. For instance, here’s a few.

Classic Comedies – http://www.netflix.com/browse/genre/31694
Music Documentaries – http://www.netflix.com/browse/genre/90361
Sports Dramas – http://www.netflix.com/browse/genre/7243

You can access them by modifying the end number of the URL and you’ll be directed straight to that category if you’re logged into Netflix. There are in fact 76,000 different categories some of them extremely specific – for instance there’s a category of ‘Witty Movies by Woody Allen’.

Fortunately someone has produced an incredible list of all 76000 categories which you can find on this link. Just have a browse and you’re bound to find a few categories of interest that you’ve never found.

What’s more if you switch to another version of Netflix then these categories still work but you’ll see different movies and shows depending on which country. SO for example you could use one the Netflix VPNs such as this and switch countries before clicking the URL and see loads more. That means you can go directly to very specific genres under each country variant armed with this list and a Netflix working VPN.

It’s definitely worth trying and of course the Netflix algorithm will pick up on your choices after you watch and rate them to update your standard auto-generated menu’s too.

Innovative Cyber Criminals Hack Austrian Hotel

One of the main reasons that in the past cyber crime was never too much of an issue, was the fact that many of the people who were capable of performing the attacks were not that good at the criminal side of it.   Hopeless geeks would steal stuff nobody wanted and then get picked up when they tried extorting money.   This is changing now in a big way as cyber gangs across the world start working with organised crime and becoming much more effective.

Luxury Hotels Targeted by Hackers

One of the current hot cyber crimes is ransomware, getting access to a system and denying access to the data or applications themselves.  A popular method is for viruses to encrypt important data and destroying it unless a payment is made.   It does work occasionally but only on badly configured and poorly defended systems – any half decent disaster recovery system will make such attacks ineffective.

However the latest targets of slightly modified attacks are big hotel chains.  Hotels have long been a target for technological crime, often because there’s a mix of wealthy people using mobile devices and poor levels of IT support and administration.   Previous targets have been hijacking Hotel Wifi systems or infecting lobby computers to steal usernames and passwords.   The latest twist however is to target a much more practical application, the hackers are taking over the hotels keycard systems.  The application which controls, registers and deregisters the room control cards – effectively controlling access to guests rooms – locking them in or out at will.   These are often also linked directly to reservation systems which can also cause havoc for any hotel.

There have been many rumours of these attacks taking place, however one hotel has decided to admit that they were attacked and decided to pay the ransom.  The hotel is a luxurious four star place in Austria called the Romantic Seehotel Jaegerwirt set alongside a beautiful Alpine lake.   Like many modern hotels they have a sophisticated IT system which controls all the key cards.   When the system was compromised none of the keys worked and nobody could open any of the room doors – customers were either locked in or out of their room.

Imagine the chaos that would cause the hotel management, especially on the opening weekend of their busy Winter season.  Then the demand came, a relatively modest request for 1500 EUR paid in Bitcoins in order to restore their key card system and access to the reservation application.  As the manager pointed out, the police and insurance are of little help when you have 180 guests locked out of their rooms.  The manager decided that paying the demand was quicker and cheaper than any other alternative.  There are two crucial aspects to this case, the modest request and the fact that when it was paid the hackers kept their word and restored the system.   These factors are crucial to convincing  victims that ‘paying up’ is the sensible option it in fact the best business decision in the circumstances.

Cyber crime is moving into a new and more dangerous phase than the amateuristic attacks we have seen in the past.   More and more of our world and systems are accessible online, the IoT (Internet of Things) is bringing vulnerabilities into our world that previously didn’t exist and criminals are using these avenues to run their businesses.  The hotel has interestedly identified an upgrade that will prevent these attacks in the future, their next refurbishments will replace the keycards with ordinary keys which were originally used by the hotel when it opened over a hundred years ago.

Best UK VPN Access for iPlayer

Which is the best UK VPN Access provider with British based servers for BBC iPlayer?  It’s a difficult question, simply down to the huge choice that is available now online.  Years ago, I was involved in a project to install a Virtual Private Network (VPN) client on thousands of laptops in a large multinational company.  The laptops consisted of wide variety of hardware, lots of different language builds and each had different software installed (even some VPN client software which needed to be removed first).   One thing I did learn throughout this project is that VPN client software can cause all sorts of problems mainly concerned with network connectivity if it doesn’t work properly.

best vpn for UK TV abroad

Reliable Software is Important

This is why, choosing a reliable VPN service is so important. For most of us, an internet connection is why we use our computers, using a poor service will at best slow down your connection and at worse completely break it. A VPN needs to be well configured, maintained and supported both at the client and the server side to work quickly, securely and seamlessly.

In fact seamlessly is an important point, because the better a service is, the less impact it will have on your connection.  If your internet speeds plummet to a slow crawl as soon as you enable the connection then it’s going to be fairly worthless.

Most people need a VPN for the following reasons:

  • Secure their connection and personal details.
  • Access blocked websites like Hulu, BBC iPlayer, ABC and others.
  • Privacy

There are other reasons, but it’s mainly to bypass blocks and ensure security, any well run VPN should be able to supply both of these.  If you’re interested in a accessing a particular service like British TV online then a fast UK connection is the priority.  This is an important point, the best VPN or Smart DNS service will actually allow you access to a network of VPN servers in different countries. However it is the speed of the specific servers that you connect to which will ultimately determine how it performs.

For example, many services offer a server in a few different countries, which is great if you are not concerned about which country you connect to.  However if you want to watch and access the BBC online then you will have to select a UK one to change your IP address, unfortunately so will many others.   Which is why for so many companies popular servers will be completely overloaded.

Identity Cloaker monitor their servers 24/7 and because they are one of the oldest and safest UK VPN Access providers on the internet they have a wealth of expertise in maintaining fast, accessible servers.  They also have deployed servers based on demand – their network has dozens of UK and US servers with huge, available bandwidth to be used for the popular media sites like the BBC and Hulu, but less servers based in other countries.

Which means their UK VPN servers are fast, very fast especially when used with the compression algorithm in the client software.

The reality is that the service is one of the best because it has been around for so long and been actively developed.  The software is sophisticated and robust, the servers have been optimized over the years to provide the fastest and most effective service.

Here’s a great example, although Identity Cloaker was originally available using the client software which redirected through a UK BBC proxy for British addresses but it was becoming apparent that demand was moving towards different devices.  For example many people were starting to stream video directly onto Smart TVs, tablets or media devices.  Making different versions of the VPN client software was almost impossible for many of these devices, how do you install software onto your Smart TV for example?

Which is why all the Identity Cloaker servers were modified to allow direct VPN connections from other devices.  Basically it was possible now to set up your VPN connection manually on tablets, ipads and phones.  You can even connect directly from your router to effectively switch every device to use the VPN even things like Smart TVs – watch this video.

This won’t be suitable for everyone of course, because by default it does effect every device connected to that router.  However it’s a marvelous fix for situations where you can’t get access to the network configuration settings and still need the a good VPN you can get access to.   Most modern routers will have this facility, although unfortunately in the UK there is a tendency for ISPs to supply heavily restricted devices.  BT have removed the majority of the connection settings in it’s Home Hub device including much of the VPN functionality.  The overriding advantage of this message though is that the IP address is classed as a residential one, a valuable asset that you’d normally pay for from a residential IP provider !

However for speed, security and reliability then I can thoroughly recommend Identity Cloaker which you can try out for 10 days using their . .

Snooper’s Charter – UK Passes Surveillance Law

This was always likely to happen given recent events, the ridiculous snooper’s charter which was originally tabled in 2012 by the then home secretary Theresa May has been approved and passed.

12-01-2009-anonsymoussurfingsoftware-anonymous_democracy-dictators

Over the years it’s been blocked and repealed with good cause, civil liberties groups have described it as the most extreme surveillance legislation ever passed in a democratic nation.   It’s a huge blow to personal privacy with the government basically having access to pretty  much everything we do online.

Here’s some stand out points:

Internet provider’s Forced to Log Web History for 12 Months

This is a great one, your ISP will be forced to record every single web site you visit for 12 months.  So just imagine this, Government departments will be able to generate a list of every single web site you have visited for the last year.   Sounds a bit Orwellian,  a bit intrusive?  We thinks so!  Further imagine sitting down for an interview or an application with some Government official sitting across the desk from you with that list in hand.

Decrypt Data on Demand

The government will have the power to force any company or individual to decrypt data on demand.  Obviously no one really has any idea how this will work or how it can be implemented, but this just means it can be made up to suit the situation.  Is your VPN a protection, who knows if the law demands you hand over the key perhaps not.

Intelligence Agencies can Hack into Our Devices and Computers

Great eh!  Not only do they get a list of every porn site you may have inadvertently clicked on over the last 12 months, but the Government can legitimately hack into your phone, TV or internet enabled toaster to pry just a little bit further.  The use of the word ‘devices’ means they have pretty much ‘carte blanche’ to break into every electronic device in your possession and create sinister, snoopy lists and databases.

government-snoop-information

There are many other provisions, and in the spirit of oppressive regimes everywhere lots  of them are kept suitably vague and unclear.  This is important because it allows the security agencies to do pretty much anything and claim it is covered under the legislation.  Places like Iran, Turkey and China have been doing this for decades.

Is privacy a basic human right?  Many people think so, yet this legislation completely erodes that concept.   It’s been criticized from all quarters – privacy groups, United Nations representatives, lots of IT companies and even the parliamentary committee that was tasked with looking through the bill.

Nothing seemed to matter and the UK has now established a legal right to spy on it’s citizens like some second rate, despotic regime.