PureVPN Explains How it Helped the FBI Catch a Cyberstalker

After several days of radio silence, VPN provider PureVPN has responded to criticism that it provided information which helped the FBI catch a cyberstalker. In a fairly lengthy post, the company reiterates that it never logs user activity. What it does do, however, is log the IP addresses of users accessing its service.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Early October, Ryan S. Lin, 24, of Newton, Massachusetts, was arrested on suspicion of conducting “an extensive cyberstalking campaign” against a 24-year-old Massachusetts woman, as well as her family members and friends.

The Department of Justice described Lin’s offenses as a “multi-faceted” computer hacking and cyberstalking campaign. Launched in April 2016 when he began hacking into the victim’s online accounts, Lin allegedly obtained personal photographs and sensitive information about her medical and sexual histories and distributed that information to hundreds of other people.

Details of what information the FBI compiled on Lin can be found in our earlier report but aside from his alleged crimes (which are both significant and repugnant), it was PureVPN’s involvement in the case that caused the most controversy.

In a report compiled by an FBI special agent, it was revealed that the Hong Kong-based company’s logs helped the authorities net the alleged criminal.

“Significantly, PureVPN was able to determine that their service was accessed by the same customer from two originating IP addresses: the RCN IP address from the home Lin was living in at the time, and the software company where Lin was employed at the time,” the agent’s affidavit reads.

Among many in the privacy community, this revelation was met with disappointment. On the PureVPN website the company claims to carry no logs and on a general basis, it’s expected that so-called “no-logging” VPN providers should provide people with some anonymity, at least as far as their service goes. Now, several days after the furor, the company has responded to its critics.

In a fairly lengthy statement, the company begins by confirming that it definitely doesn’t log what websites a user views or what content he or she downloads.

“PureVPN did not breach its Privacy Policy and certainly did not breach your trust. NO browsing logs, browsing habits or anything else was, or ever will be shared,” the company writes.

However, that’s only half the problem. While it doesn’t log user activity (what sites people visit or content they download), it does log the IP addresses that customers use to access the PureVPN service. These, given the right circumstances, can be matched to external activities thanks to logs carried by other web companies.

PureVPN talks about logs held by Google’s Gmail service to illustrate its point.

“A network log is automatically generated every time a user visits a website. For the sake of this example, let’s say a user logged into their Gmail account. Every time they accessed Gmail, the email provider created a network log,” the company explains.

“If you are using a VPN, Gmail’s network log would contain the IP provided by PureVPN. This is one half of the picture. Now, if someone asks Google who accessed the user’s account, Google would state that whoever was using this IP, accessed the account.

“If the user was connected to PureVPN, it would be a PureVPN IP. The inquirer [in the Lin case, the FBI] would then share timestamps and network logs acquired from Google and ask them to be compared with the network logs maintained by the VPN provider.”

Now, if PureVPN carried no logs – literally no logs – it would not be able to help with this kind of inquiry. That was the case last year when the FBI approached Private Internet Access for information and the company was unable to assist.

However, as is made pretty clear by PureVPN’s explanation, the company does log user IP addresses and timestamps which reveal when a user was logged on to the service. It doesn’t matter that PureVPN doesn’t log what the user allegedly did online, since the third-party service already knows that information to the precise second.

Following the example, GMail knows that a user sent an email at 10:22am on Monday October 16 from a PureVPN IP address. So, if PureVPN is approached by the FBI, the company can confirm that User X was using the same IP address at exactly the same time, and his home IP address was XXX.XX.XXX.XX. Effectively, the combined logs link one IP address to the other and the user is revealed. It’s that simple.

It is for this reason that in TorrentFreak’s annual summary of no-logging VPN providers, the very first question we ask every single company reads as follows:

Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user/users of your service? If so, what information do you hold and for how long?

Clearly, if a company says “yes we log incoming IP addresses and associated timestamps”, any claim to total user anonymity is ended right there and then.

While not completely useless (a logging service will still stop the prying eyes of ISPs and similar surveillance, while also defeating throttling and site-blocking), if you’re a whistle-blower with a job or even your life to protect, this level of protection is entirely inadequate.

The take-home points from this controversy are numerous, but perhaps the most important is for people to read and understand VPN provider logging policies.

Secondly, and just as importantly, VPN providers need to be extremely clear about the information they log. Not tracking browsing or downloading activities is all well and good, but if home IP addresses and timestamps are stored, this needs to be made clear to the customer.

Finally, VPN users should not be evil. There are plenty of good reasons to stay anonymous online but cyberstalking, death threats and ruining people’s lives are not included. Fortunately, the FBI have offline methods for catching this type of offender, and long may that continue.

PureVPN’s blog post is available here.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

South Park Fractured But Whole review: Emphasis on the “fractured”

It’s still South Park, but it sure isn’t 2014’s amazing Stick of Truth.

Enlarge / As a watchable piece of entertainment, The Fractured But Whole does pretty well. As a game, on the other hand... (credit: Ubisoft)

Three and a half years have passed, and yet I still can't get over how good a video game South Park: The Stick of Truth turned out to be. Licensed games have improved a lot in recent years, but their quality is never guaranteed, and the South Park license had never been used to solid effect until that 2014 RPG came along. (A major legal-rights shuffling didn't help Stick of Truth's pre-release worries, either.)

In that game, Obsidian Entertainment and South Park Studios took roughly 15 years of South Park material (basically, everything after the Bigger, Longer, and Uncut film), then recapped and celebrated the series' best characters and most NSFW plotlines. More importantly, its power as a video game was used to incredible effect, whether by sending up RPG tropes and traditions or by making its interactive moments nearly as funny as its scripted ones.

That's quite the bottle of lightning, and there's no shame in the fact that its video game sequel, this week's The Fractured But Whole, doesn't recapture the same incredibly crude magic. But it's still sad how much the series' new developers at Ubisoft missed the mark here. This is by no means a bad video game—and effort was absolutely poured into making its RPG elements feel more substantial than last time—but the LEGO bricks of this game's combat, exploration, themes, and South Park-caliber script were all put in the wrong order.

Read 16 remaining paragraphs | Comments

Millions of high-security crypto keys crippled by newly discovered flaw

Factorization weakness lets attackers impersonate key holders and decrypt their data.

Enlarge / 750,000 Estonian cards that look like this use a 2048-bit RSA key that can be factored in a matter of days. (credit: Steve Jurvetson)

A crippling flaw in a widely used code library has fatally undermined the security of millions of encryption keys used in some of the highest-stakes settings, including national identity cards, software- and application-signing, and trusted platform modules protecting government and corporate computers.

The weakness allows attackers to calculate the private portion of any vulnerable key using nothing more than the corresponding public portion. Hackers can then use the private key to impersonate key owners, decrypt sensitive data, sneak malicious code into digitally signed software, and bypass protections that prevent accessing or tampering with stolen PCs. The five-year-old flaw is also troubling because it's located in code that complies with two internationally recognized security certification standards that are binding on many governments, contractors, and companies around the world. The code library was developed by German chipmaker Infineon and has been generating weak keys since 2012 at the latest.

The flaw is the one Estonia's government obliquely referred to last month when it warned that 750,000 digital IDs issued since 2014 were vulnerable to attack. Estonian officials said they were closing the ID card public key database to prevent abuse. Last week, Microsoft, Google, and Infineon all warned how the weakness can impair the protections built into TPM products that ironically enough are designed to give an additional measure of security to high-target individuals and organizations.

Read 18 remaining paragraphs | Comments

Medion Akoya E2228T: 280-Euro-Convertible von Aldi hat 1080p

Aldi Nord verkauft ab Ende Oktober 2017 ein neues Medion-Convertible: Das 11,6-Zoll-Gerät hat ein 1080p-Display und 4 GByte Arbeitsspeicher, auch die restliche Ausstattung samt Windows-Hello-Fingerabdrucksensor ist für den Preis hervorragend. (Aldi-PC,…

Aldi Nord verkauft ab Ende Oktober 2017 ein neues Medion-Convertible: Das 11,6-Zoll-Gerät hat ein 1080p-Display und 4 GByte Arbeitsspeicher, auch die restliche Ausstattung samt Windows-Hello-Fingerabdrucksensor ist für den Preis hervorragend. (Aldi-PC, Instant Messenger)

Jugendschutz: Lootboxen gelten bisher nicht als Glücksspiel

In Foren vergleichen Computerspieler die unbeliebten Lootboxen (virtuelle Schatzkisten) etwa aus Mittelerde oft mit Glücksspiel und fordern ein Verbot. Nun haben USK und zwei weitere für den Jugendschutz in Games zuständige Stellen ihre Sicht der Dinge…

In Foren vergleichen Computerspieler die unbeliebten Lootboxen (virtuelle Schatzkisten) etwa aus Mittelerde oft mit Glücksspiel und fordern ein Verbot. Nun haben USK und zwei weitere für den Jugendschutz in Games zuständige Stellen ihre Sicht der Dinge erläutert. (Jugendschutz, USK)

G1 X Mark III: Erste Kompaktkamera mit APS-C-Sensor von Canon

Canon hat seine erste Kompakt-Zoomkamera mit APS-C-Sensor vorgestellt. Die PowerShot G1 X Mark III erreicht eine Auflösung von 24,3 Megapixel, doch das Objektiv ist weniger lichtstark als das des Vorgängers mit kleinerem Sensor. Und in 4K kann sie auch…

Canon hat seine erste Kompakt-Zoomkamera mit APS-C-Sensor vorgestellt. Die PowerShot G1 X Mark III erreicht eine Auflösung von 24,3 Megapixel, doch das Objektiv ist weniger lichtstark als das des Vorgängers mit kleinerem Sensor. Und in 4K kann sie auch nicht filmen. (Digitalkamera, DSLR)

Xperia Touch im Test: Sonys coolem Android-Projektor fehlt das Killerfeature

Es ist ein Blick in die Zukunft: Sonys Android-Projektor Sony Xperia Touch macht jede ebene Fläche zu einem mit dem Finger bedienbaren Android-Gerät. Es ist der einzige seiner Art – mit einzigartigen Herausforderungen. Ein Test von Ingo Pakalski (Sony,…

Es ist ein Blick in die Zukunft: Sonys Android-Projektor Sony Xperia Touch macht jede ebene Fläche zu einem mit dem Finger bedienbaren Android-Gerät. Es ist der einzige seiner Art - mit einzigartigen Herausforderungen. Ein Test von Ingo Pakalski (Sony, Heimkino)

Spiele-Streaming: Nvidias Geforce Now für Mac verfügbar

Wer bisher Player Unknown’s Battleground auf einem Macbook spielen wollte, hatte Pech gehabt. Das ändert sich durch die Beta von Geforce Now: Der Spiele-Streaming-Dienst unterstützt vorerst in Nordamerika aktuelle Titel, Nutzer zahlen einfach statt dop…

Wer bisher Player Unknown's Battleground auf einem Macbook spielen wollte, hatte Pech gehabt. Das ändert sich durch die Beta von Geforce Now: Der Spiele-Streaming-Dienst unterstützt vorerst in Nordamerika aktuelle Titel, Nutzer zahlen einfach statt doppelt. (Geforce-Now, Notebook)

Hoverbike: Dubais Polizisten sollen Streife fliegen

Motorräder mit Propellern sollen künftig Polizisten in Dubai über Staus und andere Hindernisse hinweg zum Einsatzort bringen. Die Hoverbikes stammen von einem russischen Hersteller und sind eigentlich für Extremsportler gedacht. (Hoverbike, Technologie…

Motorräder mit Propellern sollen künftig Polizisten in Dubai über Staus und andere Hindernisse hinweg zum Einsatzort bringen. Die Hoverbikes stammen von einem russischen Hersteller und sind eigentlich für Extremsportler gedacht. (Hoverbike, Technologie)

LTO-8 mit 30 TByte: IBM kündigt TS2280-Laufwerk für neue LTO-Bandgeneration an

Während das offizielle LTO Program noch munter LTO 7 als Neuheit der Bandlaufwerke vermarktet und LTO 8 noch in der Zukunft sieht, prescht IBM bereits vor und kündigt die nächste Linear-Tape-Open-Generation an. Bei der Kapazität wird wie üblich geschum…

Während das offizielle LTO Program noch munter LTO 7 als Neuheit der Bandlaufwerke vermarktet und LTO 8 noch in der Zukunft sieht, prescht IBM bereits vor und kündigt die nächste Linear-Tape-Open-Generation an. Bei der Kapazität wird wie üblich geschummelt. (LTO, IBM)