• 0 Posts
  • 1 Comment
Joined 5 months ago
cake
Cake day: May 3rd, 2025

help-circle
  • 37x4H0nUPx0s@lemmy.dbzer0.comtoTechnology@lemmy.worldVPN Comparison 2.0
    link
    fedilink
    English
    arrow-up
    34
    arrow-down
    3
    ·
    edit-2
    1 day ago

    If you’re going to be giving out advice, you should at least know that Mozilla VPN is rebranded Mullvad VPN. So most of the information on your chart should be exactly the same for both.

    https://www.mozilla.org/en-US/products/vpn/features/

    Scroll down to “Convenient,” then “More than 500 servers in 30+ countries,” and click on the link “See our list of servers,” which takes you to the Mullvad website server list here:

    https://mullvad.net/en/servers

    Unless something has changed, the VPN that Malwarebytes sells is also rebranded Mullvad.

    In my opinion, if you’re going to include a VPN like PIA, you should also include who owns them (Kape Technologies - owner of multiple VPNs), and instruct people to do an internet search for “Kape Technologies malware.” I’m not saying don’t get PIA, but people should be able to at least make an informed decision:

    “Kape Technologies, originally known as Crossrider, has a history of distributing malware through its ad injection platform before rebranding and focusing on VPN services. While it has since shifted its business model, concerns about its past and corporate practices remain prevalent in discussions about its VPN offerings.”

    https://www.malwarebytes.com/blog/detections/adware-crossrider

    Adware.CrossRider

    Adware.CrossRider is Malwarebytes’ detection name for a large family of adware targeting both Windows and macOS systems. CrossRider offers a highly configurable method for its clients to monetize their software.

    Source and type of infection

    Adware.CrossRider is usually installed by bundlers. Programs offering some kind of functionality are combined with the adware component.

    Additional reading: https://en.wikipedia.org/wiki/Teddy_Sagi#Kape_Technologies

    Likewise, inform people to search for “Nord data breach,” so people can again make an informed decision. It wasn’t the fact that there was a data breach, but how it was handled that some had a problem with:

    “Evidence indicates the attack most likely happened some time between January 31st, 2018, when the server came online, and March 5th, 2018. The attack was made via a compromised data center account, not an account managed by NordVPN. The data center deleted this account on March 20th, 2018, blocking any further access to the server. NordVPN claims not to have been notified about the breach until April 13th, 2019, more than a year after it happened. It took down the server the same day, and began an immediate audit of its 5,000 servers. The company wouldn’t go public until evidence of the hack emerged some six months later. Why? The blog post stated: ‘thoroughly reviewing the providers and configurations for over 5,000 servers around the world takes time. As a result, we decided we should not notify the public until we could be sure that such an attack could not be replicated anywhere else on our infrastructure.’”

    Again, not saying there is a problem with PIA and Nord, just that people should know about these things before making a decision.