close
    • chevron_right

      Fighting VPN criminalization should be Big Tech’s top priority, activists say

      news.movim.eu / ArsTechnica · Monday, 20 March, 2023 - 11:00 · 1 minute

    Fighting VPN criminalization should be Big Tech’s top priority, activists say

    Enlarge (credit: Aurich Lawson | Getty Images)

    “Women, life, freedom” became the protest chant of a revolution still raging in Iran months after a 22-year-old Kurdish woman, Mahsa Amini, died while in custody of morality police. Amini was arrested last September for “improperly” wearing a hijab and violating the Islamic Republic's mandatory dress code laws. Since then, her name has become a viral hashtag invoked by millions of online activists protesting authoritarian regimes around the globe.

    In response to Iran's ongoing protests—mostly led by women and young people—Iranian authorities have increasingly restricted Internet access. First, they temporarily blocked popular app stores and indefinitely blocked social media apps like WhatsApp and Instagram. They then implemented sporadic mobile shutdowns wherever protests flared up. Perhaps most extreme, authorities responded to protests in southeast Iran in February by blocking the Internet outright, Al Arabiya reported . Digital and human rights experts say motivations include controlling information, keeping protestors offline, and forcing protestors to use state services where their online activities can be more easily tracked—and sometimes trigger arrests.

    As getting online has become increasingly challenging for everyone in Iran—not just protestors—millions have learned to rely on virtual private networks (VPNs) to hide Internet activity, circumvent blocks, and access accurate information beyond state propaganda. Simply put, VPNs work by masking a user's IP address so that governments have a much more difficult time monitoring activity or detecting a user's location. They do this by routing the user's data to the VPN provider's remote servers, making it much harder for an ISP (or a government) to correlate the Internet activity of the VPN provider's servers with the individual users actually engaging in that activity.

    Read 47 remaining paragraphs | Comments

    • chevron_right

      Code-execution bug in Pulse Secure VPN threatens patch laggards everywhere

      Dan Goodin · news.movim.eu / ArsTechnica · Wednesday, 26 August, 2020 - 12:30

    Code-execution bug in Pulse Secure VPN threatens patch laggards everywhere

    Enlarge (credit: Bid.in2corporate.com )

    Organizations that have yet to install the latest version of the Pulse Secure VPN have a good reason to stop dithering—a code-execution vulnerability that allows attackers to take control of networks that use the product.

    Tracked as CVE-2020-8218, the vulnerability requires an attacker to have administrative rights on the machine running the VPN. Researchers from GoSecure, the firm that discovered the flaw, found an easy way to clear that hurdle: trick an administrator into clicking on a malicious link embedded in an email or other type of message.

    Phishing season has now officially started

    “While it does require to be authenticated,” GoSecure researcher Jean-Frédéric Gauron wrote in a post , referring to the exploit, “the fact that it can be triggered by a simple phishing attack on the right victim should be evidence enough that this vulnerability is not to be ignored.”

    Read 10 remaining paragraphs | Comments

    index?i=oY6SoYP6cz8:NexhJzKGcxY:V_sGLiPBpWUindex?i=oY6SoYP6cz8:NexhJzKGcxY:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA