TunnelVision, VPNs and You

Firewalls Don't Stop Dragons Podcast

Two security researchers showed how many modern VPN services are vulnerable to malicious misconfiguration, exposing some or all of your internet traffic. While this is not likely to impact most of us, it does expose the limitations of Virtual Private Networks and why they are not silver bullets for security of privacy – despite many marketing claims to the contrary. Today we’ll discuss how TunnelVision works, how it can be mitigated, and how this affects different privacy threat models with the two researchers from Leviathan Security, Dani Cronce and Lizzie Moratti.

Interview Notes

  • Lizzie Moratti: https://www.linkedin.com/in/lmoratti/ 
  • Dani Cronce: https://www.linkedin.com/in/danicronce/ 
  • TunnelVision: https://www.tunnelvisionbug.com/ 
  • ProtonVPN threat model: https://protonvpn.com/blog/threat-model 
  • Dani’s GitHub: https://github.com/superit23 
  • Leviathan Security blog: https://www.leviathansecurity.com/blog 
  • Veilid: https://veilid.com/ 
  • Willy Wonka scene: https://www.youtube.com/watch?v=pvS3j8VtanM 
  • Linux network namespaces: https://blog.scottlowe.org/2013/09/04/introducing-linux-network-namespaces/ 
  • What is DeFi? https://www.investopedia.com/decentralized-finance-defi-5113835 

Further Info

  • Help me brainstorm ways to reach more people!: https://fdsd.me/awareness2 
  • Send me your questions! https://fdsd.me/qna 
  • Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book 
  • Subscribe to the newsletter: https://fdsd.me/newsletter 
  • Become a patron! https://www.patreon.com/FirewallsDontStopDragons 
  • Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch 
  • Give the gift of privacy and security: https://fdsd.me/coupons 
  • Support our mission! https://fdsd.me/support 
  • Generate secure passphrases! https://d20key.com/#/ 

Table of Contents

Use these timestamps to jump to a particular section of the show.

  • 0:01:23: Reminder: brainstorming survey
  • 0:01:47: Podcast chapter markers!
  • 0:02:54: Interview setup
  • 0:05:55: What is a VPN and what isits intended purpose?
  • 0:10:27: If most connections are secured today, why do we need a VPN?
  • 0:12:40: Why do we trust a VPN provider more than our internet access provider?
  • 0:17:40: What are you trying to do with a VPN?
  • 0:19:13: Who can see my internet traffic?
  • 0:25:30: What is TunnelVision and what are the implications for VPN users?
  • 0:29:42: What’s a less technical way to understand TunnelVision?
  • 0:33:06: Why might I not want all my traffic to go through the VPN?
  • 0:35:02: How dangerous is TunnelVision for the average person?
  • 0:42:30: How did the VPN companies respond?
  • 0:51:19:

Чтобы прослушивать выпуски с ненормативным контентом, войдите в систему.

Следите за новостями подкаста

Войдите в систему или зарегистрируйтесь, чтобы следить за подкастами, сохранять выпуски и получать последние обновления.

Выберите страну или регион

Африка, Ближний Восток и Индия

Азиатско-Тихоокеанский регион

Европа

Латинская Америка и страны Карибского бассейна

США и Канада