VPN PROTOCOLS


INFORMATION ABOUT VPN PROTOCOLS

78e646_1626122c8b8d4ffd9a6ebffc2b114f42.jpg_srb_p_157_160_75_22_0.50_1.20_0

With news that the NSA is actively trying to break VPN encryption protocols picking the right VPN Service is critical. According to reports that some protocols have already been broken and for some time. Specifically, those based on the Point-to-Point Protocol (PPTP)—have previously been identified as being vulnerable.

  • PPTP is a fast, & easy-to-use protocol with a simple setup process. Unfortunately it is likely comprised by the NSA and therefore should be avoided.
  • L2TP/IPsec requires IPsec to provide encryption. May be compromised by NSA.
  • OpenVPN is an open source technology – the recommended protocol for desktops including Windows, Mac OS X and Linux. Highest performance – fast, secure and reliable.
  • VyprVPN Chameleon – Golden Frog’s proprietary 256-bit SSL protocol masks VPN traffic so it cannot be identified as a VPN connection and blocked, while retaining speed and security.
VPN PROTOCOL COMPARISON.

PPTP L2TP/IPSec OpenVPN IKEv2 VyprVPN Chameleon
Open Source
VPN Encryption 128-Bit 256-Bit 160-Bit
256-Bit
128-Bit
192-Bit
256-Bit
256-Bit
VPN Stability
Secure against Government
Recommended Not open source, Therefore hard to know potential exploits.