![]() But we’re not particularly paranoid, just want to be as prudent as reasonably possible. I get that there are lots of other vulnerabilities that have nothing to do with VPNs (keyloggers, and targeted personal attacks). It’s my laptop (and phone, and wife’s laptop, etc. All very minor risks, but you did say you’re paranoid. On the sites that don’t, the library can’t see what you’re dong, but your VPN provider still can, and any sys admin or security agency between them and your destination website can too.Īlso, your information might be secured over the network, but it can still be stolen through physical proximity: somebody looking at your screen, or somebody listening to keystrokes or CPU cycles and performing statistical analyses, recording your typing with their casually placed cell phone, etc. ![]() Usually all traffic will be routed (unless your VPN client or OS specifically sets it otherwise, but on Windows the default is to route everything).Īs for passwords, etc., most sites use HTTPS anyway and the VPN would be an additional, redundant layer of encryption on top of that. If the VPN connection is encrypted (they usually are), and if it’s properly configured with public key handshaking, and if you trust your VPN provider, then yeah, you should be reasonably safe. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |