• EnderMB@lemmy.world
    link
    fedilink
    English
    arrow-up
    19
    ·
    1 hour ago

    When I first saw this I thought it was funny. The fact that so many people are falling for it has only made it even funnier.

    FWIW, Haley Welch might seem dumb as bricks, but she also seems quite sweet - doing charity stuff, keeping her other friend from “that” vid for the ride, etc. As far as people becoming famous for bullshit reasons goes, she seems to be handling it well.

  • RiQuY
    link
    fedilink
    English
    arrow-up
    10
    ·
    1 hour ago

    I don’t understand why everyone assumes using a VPN means paying for a third party. I have Wireguard deployed in my NAS and I always have that VPN connection active on my phone to be able to access my LAN deployed services remotely, Jellyfin for example.

    • diffusive@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      37 minutes ago

      My setup as well (plus encrypted DNS for good measure)

      I still have to somehow trust my ISP but I go down from having to trust my mobile ISP, my employer WiFi, random shops WiFi to just one ISP (that,fwiw, has shown to be transparent, customers friendly etc)

  • cum@lemmy.cafe
    link
    fedilink
    English
    arrow-up
    184
    arrow-down
    9
    ·
    6 hours ago

    What is he talking about, public WiFi can easily poison and monitor your DNS requests (most people don’t know or use encrypted DNS), and there’s still tons of non-https traffic leaks all over the place that are plain text. Even if encrypted, there’s still deep packet inspection. VPNs can mitigate DPI techniques and shift the trust from an easily snoopable public WiFi to the VPN’s more trustworthy exit servers.

    This guy really needs to elaborate on what he’s trying to say when the cyber security field very much disagrees with this stance. I’m not a huge fan of Proton, but they aren’t doing anything wrong here. You should use it for public Wi-Fi.

    • Appoxo@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      14 minutes ago

      Dpi only works if they install a cert on your phone. Else they can’t crack it (in real time) or you would receive HTTPS errors

    • Fontasia@feddit.nl
      link
      fedilink
      English
      arrow-up
      6
      ·
      2 hours ago

      Yeah, while it is true, lots of VPN companies are grifts just buying VPS’s and installing OpenVPN, this “Cyber security expert” puts far too much faith in HTTPS and probably never seen a lecture from the Black Hat conference

    • Avid Amoeba@lemmy.ca
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      1
      ·
      edit-2
      4 hours ago

      Yup. You can grab any unencrypted data passed between the user’s browser and a server literally out of thin air when they’re connected to an open access point. You sit happily at the Starbucks with your laptop, sniffing them WiFi packets and grabbing things off of them.

      Oh and you have no idea what the myriad of apps you’re using are connecting to and whether that endpoint is encrypted. Do not underestimate the ability of firms to produce software at the absolute lowest cost with corners and walls missing.

      If I was someone who was to make money off of scamming people, one thing I’d have tried to do is to rig portable sniffers at public locations with large foot traffic and open WiFi like train stations, airports, etc. Throw em around then filter for interesting stuff. Oh here’s some personal info. Oh there’s a session token for some app. Let me see what else I can get from that app for that person.

    • Lucy :3@feddit.org
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      6
      ·
      1 hour ago

      most people don’t know or use encrypted DNS

      But a cybersecurity expert does. That’s the point. If you know those things, VPNs become obsolete, for most people. So why not teach people about it, instead of promoting VPNs?

      And can you really trust an extremely profit focused company, that is built on user data, more than your local Café? If you’re in China, sure, use a VPN, they’re the lesser evil. But most spots don’t have the resources or expertise to analyze and sell or otherwise misuse your logs. VPN companies not only do, most rely on it.

      If you’re a highly targeted person, it’s another story, but in that case your only hope is Tor or a new identity.

      • Cryophilia@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        1
        ·
        edit-2
        50 minutes ago

        So why not teach people about it, instead of promoting VPNs?

        Ok then, in the meantime the rest of us will use a fucking VPN? I don’t know what “encrypted DNS” means, and I’m 99% you’re going to respond with either “whaaaaat you don’t know something that 99.999% of other people also don’t know? Clearly you are too dumb for the internet” or else “oh sure I’d be glad to explain that! It’s real simple, see when you have a Rosendin gembal, it befrazzles the gesticulators of your brangles (link to a Wikipedia article on brangles). So you just have to re-delineate the scanditrons to break the tensor lines in your scintrins! You can code a fairly simple app from scratch to do it, and there’s a FOSS program someone made to help you identify the cabangs in your computer’s lenticles: (link to a github page that is literally just a transcription of an eldritch god screaming in binary)”

        VPNs are extremely user friendly and they are happy to explain in layman’s terms exactly what they do and how they work. If there’s a better way, it’s locked behind years of techie knowledge.

        • Lucy :3@feddit.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          23 minutes ago

          And most users don’t know what a VPN is. In both cases, they’re not gonna learn anything about it. Except you need to pay for a VPN, after figuring out which one is kinda trustworthy instead of snakeoil, while encrypted DNS is a simple setting on any OS. Nothing more. You don’t need whole articles to explain what your product does and why you respect privacy and blah, while not saying a single word that’s true. It’s a simple setting. VPNs are not only user friendly, they’re a full ripoff for most people and snakeoil. They don’t explain what they do in “laymans terms”, most of them just blatantly lie. Anything for the cash. If you want an explanation of encrypted DNS:

          A DNS is kind of like your GPS. It translates an address into something more usable, e.g… like your GPS translates ‘123 Baker Street, Washington’ into coordinates, so you can use it on a map, for example. A DNS does the same, but for the internet: It translates “google.de” into a format that is actually readable and usable to the computer. However, to translate “google.de” you need to reach out to someone else, that knows the address. The thing is, if someone just pretends to give the right answer, but in fact gives you their own address, you may end up at the wrong website, or in the GPS example, at the wrong house. So instead of visiting your actual bank’s website, you’re going to visit someone else’s website, which looks basically the same, except once you log into your bank account the attacker can read that and steal all your money. In the GPS example, you would now be at the slaughterhouse instead of Disneyland. An encrypted DNS just means that you specify exactly whom you will trust, for example google, and that you want your communication with google to be encrypted, so no one can even read which website you want to visit.

          If someone doesn’t understand this, they wouldn’t understand what a VPN is, even broken down to bare concepts. So for those people: It makes you safe just trust me just set this setting, no app, no account, no money required. Because that’s the level a typical VPN company argues on.

      • Maggoty@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 minutes ago

        Lmao, we’re not worried about the cafe. We’re worried about the man in the middle. And yeah with enough tech knowledge you can set up an encrypted tunnel home and use your normal connection from there. But most people aren’t that tech savvy

      • JustEnoughDucks@feddit.nl
        link
        fedilink
        English
        arrow-up
        2
        ·
        54 minutes ago

        People can’t learn not to throw trash in the street, climate change that is backed by decades of science is a problem, or hell, they can’t even learn to effectively not click on super suspicious phishing links.

        How on earth are they going to learn about implementing encrypted DNS when most barely know the difference between a browser and a computer.

      • Sem@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        34 minutes ago

        But most spots don’t have the resources or expertise to analyze and sell or otherwise misuse your logs.

        Most spots don’t have also the resources or expertise to secure their own spot. As I remember, cheap routers used in public places may contain a lot of vulnerabilities.

        encrypted DNS

        Will it help me if I’m using LbreTorrent do download piracy content on my phone? Or how it would help me to hide my location from mobile apps that extract location from IP?

        • Lucy :3@feddit.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          12 minutes ago

          No. That’s a whole different use case. We’re discussing what most people in a public network should do. Some people, such as whistleblowers, journalists etc. maybe should use a VPN. For you grandparents, it would be pure snake oil. And even as such an endangered person, choosing the wrong, so almost all, VPNs would be even more dangerous.

          For your problems, a VPN could be useful, even though for the former I would use the usenet or soap2day-like sites, which do not have you seed that content. If you still want to share it, then use a VPN. ONLY for the torrent process, not for anything else, as that would still be bad for privacy and security, as the VPN company could, and most WILL, surveil and log you. And for the latter problem, don’t use such apps except in closed environments or without internet access.

    • AlecSadler@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      2
      ·
      3 hours ago

      I’m not even an expert in this stuff, but with a tool I found online I demonstrated that it was easy to snoop people’s passwords on my school’s wifi networks back in the day. It took minutes.

          • 5dh@lemmy.zip
            link
            fedilink
            English
            arrow-up
            4
            arrow-down
            1
            ·
            40 minutes ago

            I’m sorry, but I don’t believe it is. Nearly all traffic is TLS. When this is attacked, you’d get TLS error. Am I missing something?

            • AlecSadler@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              1
              ·
              8 minutes ago

              There exist plenty of services on school campuses that send passwords in plaintext. There are services outside of school campuses that do, too. Hell, I’ve been able to bypass 2FA checks by just navigating around them, I don’t know what else to tell you, not everything out there uses the best security practices, so don’t assume that they do.

    • asdfasdfasdf@lemmy.world
      link
      fedilink
      English
      arrow-up
      23
      arrow-down
      2
      ·
      edit-2
      6 hours ago

      How is DPI a problem if it’s encrypted? That would only work if the attacker had installed their CA cert on your client machine, right?

      • henfredemars@infosec.pub
        link
        fedilink
        English
        arrow-up
        22
        arrow-down
        1
        ·
        6 hours ago

        I’m doing DPI on my own network and I can still view TLS certificate fingerprints and some metadata that provides a good educated guess as to what a traffic flow contains. It certainly better that it’s encrypted, but there is a little information that leaks in metadata. I think that’s what was meant.

        • catloaf
          link
          fedilink
          English
          arrow-up
          14
          ·
          edit-2
          4 hours ago

          True, but this is generally not useful information to anyone. They can see you’re visiting bank.com, but they still can’t see your bank details.

          It might be useful if they’re trying to target you for phishing, but a targeted attack is extremely unlikely.

          Also, any wireless equipment from the past 15 years or so supports client isolation.

          • groet@feddit.org
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 hour ago

            Client isolation doesn’t help. That is just the access point not routing traffic between connected devices. The problem with WiFi is it is a radio signal. Everybody in range can receive 100% of all communication on that network. Just by being in range the attacker can do passive sniffing. No wiretap needed like with cabled networks.

            WiFi is encryoed if it uses a password. So any public WiFi without a password can be sniffed by literally every device in range (no need to connect to the WiFi for sniffing). On public WiFi with a password, the radio signal is encrypted but everybody knows the encryption key. So everybody connected to the WiFi can still sniff the traffic of everybody else.

            That encryption is only on the WiFi level, so encrypted radio signals, not on the actually traffic level (like TLS/HTTPS etc).

      • orange@communick.news
        link
        fedilink
        English
        arrow-up
        12
        ·
        edit-2
        5 hours ago

        I think it might be confusion between inspecting plaintext metadata like SNI vs actually inspecting encrypted contents (e.g. HTTPS content, headers, etc.).

  • priapus@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    41
    arrow-down
    1
    ·
    6 hours ago

    This was nothing more than a poorly executed joke from Proton. Some people are massively overreacting.

    • thirteene@lemmy.world
      link
      fedilink
      English
      arrow-up
      25
      arrow-down
      6
      ·
      5 hours ago

      Hailey “Hawk Tuah” Welch is an influencer that gained a lot of popularity from her nickname (the sound of spitting, with HEAVY implications of performing fellacio). She used her platform to voice a very reasonable and intelligent opinion, which surprised a lot of people because her nickname is essentially blowjob queen.

      One of her opinions is that it’s important to spread cyber security and used her fame to try to educate the public (potentially a fake story from the image? Idk this drama). And some xit-head claiming to be a cyber security expert ate the onion and offered some shitty advice. Proton fact checked them, because there are a ton of fake news stories about her right now.

      • catloaf
        link
        fedilink
        English
        arrow-up
        18
        arrow-down
        2
        ·
        4 hours ago

        I’m pretty sure that Proton quoting her in the first place is fake. I know she’s milking her 15 minutes of fame for all she can, but this seems outside her experience.

        • tb_@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 hours ago

          but this seems outside her experience.

          When has that ever stopped people from saying shit.

        • noodlejetski
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          1 hour ago

          that’s gonna brick it. it’s right there in its name.

          people on the internet and their advice sometimes, ffs.

          • dumbass@leminal.space
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 hour ago

            Nah, you just gotta do it correctly, yeah you might brick a few computers, TVs, cars or a couple electrical mains boxes, but once you master the technique you’ll be able to restart anything.

  • m-p{3}@lemmy.ca
    link
    fedilink
    English
    arrow-up
    65
    arrow-down
    1
    ·
    edit-2
    7 hours ago

    Considering how most of the Internet is encrypted with TLS, if you add DNSSEC+DoH/DoT on top, trying to MITM someone on a public WiFi is way harder than it was, unless you’re a state-level adversary and you’re able to craft valid certificate for a domain you don’t control from a globally trusted (root) certificate autority (which will lose its trusted status quite fast once discovered, ex: CNNIC)

    • hamsterkill@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      38
      ·
      7 hours ago

      Not all applications on your computer may be encrypting their packet traffic properly, though. That goes especially for the applications that might be trying to reach out for resources on your local home network (like printers, file shares, and other home servers) as well as DNS requests which are usually still made in the open. I would not recommend eschewing an entire security layer willy-nilly like that. On public Wi-Fi, I would definitely still suggest either a VPN or using your cell phone as a tether or secure hotspot instead if possible.

      • MimicJar@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        3
        ·
        6 hours ago

        Sure, but it’s also like, if you’re stepping away from your laptop for a few minutes should you lock the screen or shut it down completely.

        The most secure option is to shut it down completely, but also it’s fine to just lock your screen.

        If you’ve already got a VPN and it’s as easy as locking your screen to enable, go for it, use it. But if you don’t, you don’t need to go out and get one. You’ll generally be ok without one.

    • linearchaos@lemmy.world
      link
      fedilink
      English
      arrow-up
      35
      arrow-down
      1
      ·
      7 hours ago

      Yeah, the days of your local coffee shops Wi-Fi being a problem or mostly gone. Not the VPN doesn’t have a place anymore though. If you’re trying to hide your downloading of ISOs from your ISP it’s still a perfectly reasonable method. Or temporarily relocating yourself to another country to make a purchase or watch some streaming content both perfectly reasonable.

      Of course some of the streaming providers are getting wise to this.

        • jonne@infosec.pub
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 hours ago

          You don’t want their admin to contact you about how you’re a n00b for not using Arch.

          • Warl0k3@lemmy.world
            link
            fedilink
            English
            arrow-up
            7
            ·
            6 hours ago

            It’s all fun and games until a Microsoft Purity Enforcement squad is kicking in your door.

            • linearchaos@lemmy.world
              link
              fedilink
              English
              arrow-up
              7
              ·
              6 hours ago

              Nah, it’s all good I subscribe to Linus Torvalds protection services. When the Microsoft vans get within four blocks of my address, They’ll drop ship in dozens of fully-armed penguin paratroopers. After the incursion they even send in a penguin based cleaner team to help get rid of the remains.

        • catloaf
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          4 hours ago

          Because we see which distros you’re using, and we judge you for it.

          Gentoo, in 2024? Really? You should be using Arch if that’s your thing. It’s not the 90s any more.

        • linearchaos@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          6 hours ago

          Yeah, pptp will always have a strong purpose and home. I’m more speaking to the viability of commercial anonymization VPN.

          • anamethatisnt@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            4 hours ago

            I have a feeling you are using pptp as shorthand for Point to Point disregarding protocol and already knows what I’m about to say. To anyone else reading this - PPTP is obsolete and unsafe. Use an alternative such as OpenVPN, WireGuard or SSTP.

  • 𝒎𝒂𝒏𝒊𝒆𝒍@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    2
    ·
    5 hours ago

    "It’s a prank bro"😅 but seriously as an IT guy I’m tired of pushing VPNs down our (collective) throats, not saying the threat isn’t real but it’s really overblown by the ads

  • Kokesh@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    6
    ·
    2 hours ago

    Also - using someone who got famous by describing sucking dick seems quite weird :) Who wants technical advice from her?

  • chagall@lemmy.world
    link
    fedilink
    English
    arrow-up
    28
    ·
    8 hours ago

    This was poorly executed. The National Park Service twitter account does jokes well.

  • LEDZeppelin@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    2
    ·
    5 hours ago

    Taking cybersecurity advice from someone called Hawk Tuah is modern day version of clicking banner that says find 40+ single women in your zip code

    • undefined@links.hackliberty.org
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      2 hours ago

      Maybe from a security perspective but in terms of privacy, no. SNI can still be read, and just because DNS isn’t plaintext doesn’t mean it’s not possible to see which servers you’re talking to. And like others have said, there’s still a lot happening in plaintext at the OS and/or application level.

  • RegalPotoo@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    15
    ·
    6 hours ago

    The only real use case for VPNs is to bypass geo blocking on streaming sites, and the VPN providers know this. They also know that if they lean too hard into that, eventually someone will sue them and their business model will evaporate - so they add the “iT MaKEs yOu mORe SeCurE” nonsense as a fig leaf so they can say with a straight face that they operate a product with legitimate uses

    • Ilovethebomb
      link
      fedilink
      English
      arrow-up
      1
      ·
      17 minutes ago

      That is definitely what 90% of people use them for.

      I think Tom Scott is the only person who’s ever done an honest VPN sponsor read.

    • undefined@links.hackliberty.org
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 hours ago

      I can’t say VPNs are great for bypassing geo restrictions in 2024, unless you’re talking about tunneling through your home network.

    • qaz@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 hours ago

      How is this related to a VPN? Antivirus does nothing against a MITM attack.