Seven 'no log' VPN providers were hacked, exposing 1.2 TB worth of user logs. Data includes plaintext passwords, IP addresses, timestamps of user connections, session tokens, information of the device, and OS being used along with geographical information in the form of tags.

The VPN providers affected are UFO VPN, FAST VPN, Free VPN, Super VPN, Flash VPN, Secure VPN, and Rabbit VPN. If you have an account with one of these providers, I strongly suggest you delete your account immediately and if you use the same password you use for your VPN account on any other website (which you should never do), change it ASAP.

More info here:

@nichii If you unironically use a VPN service called "Free VPN", you get what you deserve.
@pasture @nichii if you care about your privacy just use TOR. It’s still trackable but less possibility
>It appears seven Hong-Kong-based VPN providers

thats it fuck hong kong

@wowaname @nichii The moral of the story is, if you really want to have a service you can trust, run it yourself. Otherwise, you can’t really trust it :laughing_cirno:

@wolfie @wowaname @nichii
Or don't use a service based in Hong Kong with China sniffing around too.
@nichii im sorry but if you trust "super vpn" with the privacy of your data you have to be retarded
@nichii I've been thinking a little about Firefox and that new VPN offering Mozilla rolled out. I mean, it is based on Wireguard, so for n00bs I suppose it may be one of the better solutions.

Personally, I've always objected to the use of the term VPN for these purposes - it's a misnomer - You're actually NOT connecting your Device or home LAN (or remote office via the corporate WAN) to the network at your office workplace, with SSO so you can login to (presumably) your Windows AD domain and have access to file/print services and the corporate exchange server behind that shittly little firewall applicance they bought last year instead of installing an OPNsense or pfSense box.

But the advertising had a really kewl Doberman sitting next to a server. Yeah,

Anyway, just for the sake of this argument, let's just consider the goombahs that make the business models of the companies highlighted in this expose possible. It's no great loss really, while the rest of us have been setting up our own simple solutions with SSH that we actually control - on our own boxes!

And now? With #Wireguard? Seriously? there's so little code or setup involved anyway it's ridiculous that people are even listening to the ads on the radio for the sucky proxy services they're selling as actual VPN solutions.

I mean, it's so simple - get yourself a #VPS, LUKs encrypt it (even /boot, yes, ya'll know how to do that?), then five mins and voila! WireGuard is up and you're now flying from Dusseldorf! Or Brisbane, or Oslo, or Johannesburg, or Chicago.

The irony? lolz.... yah, logless logs dumped all over the place - if you're being handed a bill of goods about what the product actually is in the first place, why would you believe that they're not having their cake and eating it to by feeding off of you as the product anyway? lolz.....

I think all those folks over at #Faceplant got some learnin' to be earnin' lolz.

#VPN my ass. lolz.

No can haz #Cheezburgerz!

@nichii I don't recognize any of those VPN providers, but they all sound cheap and dodgy. 😆

The problem is of course that sounding cheap and dodgy (or not) may correlate with being honest and competent or it might not ...

The article gives some well-meaning hints, but there seems to be no way to make sure your VPN provider does what they say.

At least mine (who is not on this list -- phew!) allows connections through openVPN, and support staff was able to help me at two instances -- but that don't mean too much now.

@Mr_Teatime A name is of course just a name. I was making a joke. You should never judge a book by its cover. @nichii

Sign in to participate in the conversation

Welcome to your niu world ! We are a cute and loving international community O(≧▽≦)O !