Personal data protection. How does a decentralized KelVPN handle this?
VPN services are used by millions of Internet users worldwide. But many centralized applications threaten the security of personal data, as a recent study by Consumer Reports has shown. Decentralized services such as KelVPN ensure the distribution of data between different nodes, which significantly increases their security.
Briefly on VPN
VPN (Virtual Private Network) is an encrypted connection between two networks or between a single user and a network. VPN services are designed to bypass locks and protect personal data.
There are dozens of VPN services on the market. Each has its characteristics that affect the speed of data transmission, the level of safety, the use of additional devices, etc.
VPN uses different protocols for data protection. One of the first was the PPTP VPN (Point-to-Point Tunneling Protocol) or the “point-to-point” data connection type. It is considered universal because it is supported on almost all devices with different operating systems. Due to lack of encryption, it loses in the security level to its competitors, such as the well-known OpenVPN. This technology is open-source, so you can view and change its data. In addition, it protects data better by using several types of encryption. Another popular set of protocols is IPsec (Internet Protocol Security), which can be used in addition to other VPNs, thereby increasing security. But all these protocols have vulnerabilities that developers are constantly struggling with.
What are the threats of centralized VPN
Consumer Reports has conducted extensive research into the popular centralized VPN used on Windows 10 devices. The summary is disappointing: many services promise full data protection but remain technically vulnerable to hacking. Most do not have open-source code that independent security experts can verify. And they all store the data centrally.
There are many threats to users while using a popular VPN. Their distinct weakness is a central server that stores passwords, cards data, and other information. VPN store personal data, and it could be stolen or sold. In addition, some services may pass it on to undetermined third parties. Therefore news feeds regularly appear with headlines like “Privacy of millions of Internet users is at stake! Hackers hacked into another VPN service”.
Also, some centralized VPN can request authentication by login and password, and this is called a “child VPN error” — hackers with this approach do nothing to hack the network.
Why does KelVPN not need personal information, and how does it protect data?
KelVPN is a decentralized virtual private network developed by Cellframe. KelVPN does not collect users’ data because it is based on blockchain. No centralized servers can block or hack, as information is shared directly between the participants.
KelVPN has no access to user data, so it cannot be stolen. In addition, KelVPN does not require any user authentication, unlike centralized services.
The advantage of KelVPN is the application of its security protocols. It uses various block and stream ciphers of its implementation, which could be quickly replaced. The current version of the 7.0 client uses Salsa20.
The exchange of information on KelVPN service is anonymous due to onion routing. All information is encrypted every time and applied like scales on an onion, passing through nodes or routers.
Each node decrypts only those data that point to the next node. And so on until the information reaches the last node. This technology ensures that data is preserved because intermediate routers do not know the source of information, the message itself, or the final recipient.
The set of implemented technologies in KelVPN provides confidentiality of data and protection against digital identity recognition.