Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

blow45

macrumors 68000
Original poster
Jan 18, 2011
1,576
0
Sorry guys if I am posting this is the wrong subforum, didn't know where else to put it.

I 'd love it if anyone who has the time could post some heads up of a good, reliable, secure VPN to use for privacy concerns on the web. I've done a bit of research but I am not well versed in the subject at all.

thanks.:)
 
looks great! thanks so much, I 'll definitely give it a go! :)

Do we have any info on how strict their privacy is, or to put it better if we have any info of breaches or governmental actions against it? I suppose it's not located in sweden.

(love sweden btw, only if it weren't that cold)
 
Encryption Technology
The VPN tunnel use 128-bits encryption (satisfying for most commercial applications like on-line banking).

For security reasons Ipredator do not use any American software neither for encryption nor for any other part (we anticipate that most users will in spite of that use an American OS), but there is noting stopping an advanced user from accessing Ipredator with a more secure operating system or use a specific VPN-client. Not that this is not at the moment supported by Ipredator customer care.

Legal
Ipredator is a company incorporated in Sweden. The service is basically a Swedish broadband subscription offered over the Internet. This means that the legal framework mainly consists of the The Electronic Communications Act 2003 389. What will this mean if:

· Swedish authorities or,
· Other organization or individuals demands access to information protected by Ipredator?

Ipredator VPN service enjoys the strongest legal protection possible under Swedish Law because of the service type (pre-paid flat-rate service). This means that Ipredator do not have to keep an ordinary customer database (to be able handle transactions etc.). This is of importance if forced to hand over information.

If Swedish authorities can prove beyond reasonable doubt that they have a case for demanding subscription information from Ipredator (they have to be of the opinion that if convicted the user will be imprisoned – fined not enough).

https://www.ipredator.se/faq/security/
 
sounds great!:)

btw can you tunnel one vpn into another? I don't know if this sounds strange, or downright stupid for that matter but I was wondering about it with my little knowledge of the area.
 
Wirelessly posted (Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_1_3 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7E18 Safari/528.16)

^^^ I have never heard if that bring possible. I would imagine OS X only allows you to connect to one at the time.
 
Wirelessly posted (Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_1_3 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7E18 Safari/528.16)

^^^ I have never heard if that bring possible. I would imagine OS X only allows you to connect to one at the time.

I would imagine that too, unless someone has written a patch or app to pipe one vpn to the other.
 
A VPN that doesn't use IPSec/L2TP isn't worth paying for. Try Witopia instead.

http://www.witopia.net/welcome.php

what? OpenVPN is great!
usually IPSec/L2TP, PPTP, CiscoVPN is blocked as it uses a certain range of ports, OpenVPN can use any port you want and can thus pas through any firewall ;)

I find that hidemyass.com and strongvn.com are great, do note that strongVPN does not allow for copyright infringing traffic but hidemyass does, StrongVPN also keeps more logs. StrongVPN is great in that you get both an OpenVPN and PPTP tunnel included in the price.
 
thanks guys, I appreciate your help very much, let me do some research on the terminology here as I am like I said very much a novice, so I can get back to you with a more informed opinion. :)
 
OpenVPN uses SSL/TLS. I don't know why anyone would rely on SSL/TLS at this point.

For example,
http://news.yahoo.com/s/pcworld/20110330/tc_pcworld/comodohackerclaimsanothercertificateauthority

Your example only talks about the identification portion of SSL/TLS, not its encryption. Basically, certificate exchanges are used only to identify that you are talking to who you assume to be talking to.

If you are quite sure who you are talking to, the certificate is moot and the encryption doesn't depend on the certificate itself, so it is plenty strong enough to hide your data from prying eyes.

The only reason self-signed certificates are looked down upon is hype from trusted CAs so they can sell you their overpriced digital signatures.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.