After limiting the use of social media, many users who use VPN will be able to use social media normally, but safe?
After limiting the use of social media since Wednesday (5/22/2019) afternoon, users use a VPN or Virtual Private Network to access social media such as Instagram and messaging applications, WhatsApp.
VPN can be interpreted as a connection between networks that is private and without supervision from the government.
By using VPN, people can return to using WhatsApp and Instagram normally.
However, many people use VPN but don't understand, using VPN has a big risk.
1. Data theft
The use of VPN services to penetrate government access restrictions has the potential to steal user data.
This risk will increase when using a VPN that is not trusted.
Stolen data can include user names, addresses, usernames, passwords, and other important data.
One of these data sales will be used to place advertisements on the user's cellphone or computer.
2. Spread of Malware
In the internet world, there is the term Malvertising.
Malvertising is the process of distributing Malware to computers and smartphones that use a free VPN.
When we surf the web using a VPN, unconsciously a virus or malware can easily enter the device through advertisements installed in a web.
3. Risk of 'Man in the Middle' attacks
Some VPN services can potentially launch a Man in the Middle attack.
Man in the Middle is an attack on a system of devices that mis communicate with one another.
While the attacker is in the middle of the communication path to read, hijack, and steal data even to insert malware.
4. Users are used as Network End-Points
Third parties can use our IP Address as Network End-Points.
Network Endpoints are useful for increasing VPN service bandwidth to increase the internet speed of other internet users.
In fact, some sources say there is a possibility that Network Endpoints are sold.
5. IP address leakage
VPN is a 'secret' tunnel that is used to get to the destination, namely the internet.
However, a number of VPN services have a secret path that has many holes.
These holes increase the likelihood of data theft until IP address leaks.
IP address leaks can be used by people not responsible for hacking and stealing data from VPN users.