The researchers discover that 18 famous VPN networks are connected: Why is this important


Virtual private networks are common ways to maintain your online activity and hide your actual website from the Internet service provider and your applications. But it is important to choose a safe and safe VPN.

Three university researchers have discovered that 18 are the most widely used VPNS The infrastructure participated with dangerous security defects that could display customer browsing activity and leave their systems vulnerable to damaged data. These VPNS are among the best 100 of the 100 best stores in the Google Play store, which includes more than 700 million downloads.

Read more: The best VPN service for 2025: Our best choices in a narrow race

the Study of the counterparts Through a symposium on privacy enhancement techniques, I found that these VPNS, although described as independent companies, are actually assembled to three separate families for companies.

Nothing from CNET Recommended – Expressvpn, NordVPN, Surfshark, Proton VPN and Mullvad-listed in the menu. (If you do not currently have VPN, Here’s why you want to start using one))

According to the results, these are the three groups that contain 18 VPNS:

  • Family a: Turbo VPN, Turbo VPN Lite, VPN MONSTER, VPN Proxy Master, VPN Proxy Master Lite, Robot VPN, Snap VPN and SuperNet VPN
  • Family B: Global VPN, Inf VPN, Melon VPN, Super Z VPN, Touch VPN, VPN Promaster, XY VPN and 3x VPN
  • Family c: X-VPN and Fast Potato VPN

The researchers decided that VPNS in Family A is shared between three providers linked to Qihoo 360, a company identified by the US Department of Defense as a Chinese military company. VPNS in Family B uses the same IP addresses of the same hosting company.

Learn about the parent company of VPN

It is a warning story about the importance of knowing who is behind the VPN.

“It is important to know the types of data that the VPN provider shares with its mother company and its entities,” Tomashk said. “Some of these companies may have to register the customer’s activity and share it with the authorities, depending on the judicial jurisdiction in which they work.”

Despite the warnings, Tomaschek says it is not easy to know who controls VPN. But he says that there are measures that customers can take.

“Users can do some things to help ensure that VPN uses a good reputation,” says Thomaschik. “Check the Privacy Policy – specifically for terms such as” cutting trees “,” sharing data “or” collection of data “. The Google search can help to determine whether VPN is involved in a doubtful activity.

The most VPNS pets have examined their downloads on Android, looking for interference between commercial paper, web and codebase. After defining the similarities of the code, they managed to collect 18 VPNS in three groups. The study was initially pushed through the results of the VPN Pro private “,”Who owns your VPN? 105 VPNS is run by only 24 companies

Tomaschek from CNET has advice for anyone who uses one of these 18 VPNS.

“I recommend that it be removed from your device immediately,” he said. “If you suspect that any sensitive personal data may have been at risk, it is good to monitor your credit report and consider services such as dark web monitoring or the protection of identity theft.”



Leave a Reply

Your email address will not be published. Required fields are marked *