0

I am connected to the internet in the university where I don't want the administrator or any organization to find out some of the websites and contents I check in them. I'm afraid that they might trace me back through the IP or Mac addresses.

First I use a Firefox private browsing window to not leave a trace on the computer.

Then I use FreeGate proxy software from DynaWeb, in this FAQ, they claim it is safe to use Freegate to surf the Internet.

All Internet communications are encrypted. Local surveillance systems cannot detect what you are doing.

It uses F and A tunnel modes. sometimes I use A and if its slow I use F in other computers or Networks.

Am I safe with the scenario above?

Lighty
  • 2,378
  • 1
  • 23
  • 36
Ahmad
  • 141
  • 7

1 Answers1

1

If their encryption is indeed secure, it would ensure that anyone who can eavesdrop on your connection between you and their server will not be able to find out what you are doing. This is a very big if because they don't provide any details on their FAQ about what algorithms they are using and how they use them. Their FAQ only mentions "our proprietary technology" which is a yellow flag. A good cryptosystem isn't afraid of publishing their algorithms. When they try to hide it, it might be a sign that they are rolling their own crypto and then rely on security through obscurity because they don't trust it themselves.

However, there are a few other attack vectors.

Can you trust them? When you are visiting a website which uses http and not https, the connection between DynaWeb and the target website is unencrypted. That means DynaWeb is theoretically able to monitor your whole internet activity.

Even when the website uses https, DynaWeb still knows which webservers you connect to. They don't know the exact URLs and what you do there, though.

Someone could eavesdrop on DynaWeb's outbound connection. They might not be able to tell from which customer each connection originates, but when the data is unencrypted (http), they might be able to tell from the content of the transmission.

When an attacker can eavesdrop to both Dynaweb's outbound connection and your connection, the can perform a traffic correlation attack to find out what you are doing. Encryption can hide what your communication is about, but it can't hide when you communicate and how much.

  1. 546 encrypted bytes going from you to Dynaweb
  2. 12ms later 546 encrypted bytes going from DynaWeb to https://extremelyillegalwebsite.example
  3. 145ms later 1152983 encrypted bytes comming back from https://extremelyillegalwebsite.example to Dynaweb
  4. 13 ms later 1152983 encrypted bytes going from DynaWeb to you

What could you possible be doing?

Philipp
  • 49,017
  • 8
  • 127
  • 158