New Red Couch Show Episode!

The collaboration between the US government and hackers has been a hot and caused a lot of controversy during the last years.

Now, another incident raised again the attention to this subject, when a group of hackers claimed responsibility for attacking the US Court System website and the US authorities denied it. So we decided to looked a bit deeper into it in our latest Red Couch episode. We actually interviewed the European Cyber Army, the hacker group that claimed the attacks on the US Court System website, so watch this episode now to see what they said: Continue reading

Kick off 2014 with Our Premium Offer For Less Than Half Price

Ah, that time of year again! Holidays just passed, and you’re looking forward to the opportunity of a fresh start, to changing some old habits and improving some aspects of your life.  You’re ready to get everything right in 2014 down to the smallest detail.

And because the number of hours in a day you spend online is fairly high, you should definitely do something about your online privacy. How about that content on which you always miss out because it’s not available in your country? And what measures do you take to protect yourself from cyber criminals or nosy people snooping through your personal data and constantly meddling in your business? Continue reading

The Red Couch – Episode 9

Hey there,

Episode 9 of our YouTube show on privacy, the Red Couch, is out! In this episode, our host, the British journalist, Michael Bird, is raising a really good question: Should the Internet of Things terrify us?

Find out the answer in the video bellow: Continue reading

Top 5 Hot Topics of the Week for CyberGhost5

Fresh from our support inbox, we bring you the 5 Hot Topics of the Week! You can find the solutions for the most common problems you might have encountered this week, while using CyberGhost 5. Read them all here:

pimg Continue reading

Outrunning NSA’s Bullrun

Following the latest rumors about NSA and its connected Intelligence Services, many of you Ghosties are concerned about the decryption program called ‘Bullrun’ which is said to be able to hack SSL and VPNs – along with the equal alarming news that a lot of US companies have been forced to implement backdoors to their services.

But, and it’s a big ‘BUT’ here, we need to differentiate between an eligible concern and unfounded fears. The encryption line of battle has not been broken yet. It’s under heavy attack, no doubt about that, but good encryption still works the way it should: Protecting your data!
It’s true, that an encryption program called ‘Bullrun’ exists, and it really seems it’s able to compromise security barriers like SSL (as you use with your online banking) – but it doesn’t work as good as the NSA hoped it would. That’s why they force companies to implement backdoors and influence the programming of encryption standards (so they can easily break it). In a way that bad news is a good news, because it shows that despite all the money and the man power that goes in there, less than expected came out.

wickinger

Regarding CyberGhost we’d like to ensure you that CyberGhost VPN is still a good friend:
1. We don’t use any of the maybe hacked or unsafe technologies, instead we began even before ‘Bullrun’ became public, to provide the VPN tunnel to and on ALL our servers (Free and Premium) with AES with 256 bit key length. There are no hints that AES-256 is even near to be hacked. In fact, at present it’s much more likely the earth will fall into the sun than the NSA will be able to decrypt 256 bit AES secured data. (This goes also for TrueCrypt, so don’t fall for any propaganda claiming TrueCrypt is a threat and guiding you to real unsafe technologies like Psyop.)
2. Our Windows client as well as the announced Mac OS X and Android client are based on OpenVPN. This protocol is Open Source and controlled by a worldwide community of programmers and therefore backdoor free.
3. We run our business under the Romanian legislation and can’t be forced by the NSA to take part in their goal for worldwide espionage. No backdoors included!
4. Some still in use SSL components will steadily be exchanged and updated – even though they are commonly not yet be seen as unsafe.

Like said above, good cryptography is still effective and the only option against spying eyes. If you have any other questions, please write us a comment and we will be happy to answer.

What to do when you have speed problems?

Since speed is a hot topic for our users, we decided to write a post about this and explain how speed levels differ when using a VPN connection and when you are connected to a normal Internet connection.

When using a VPN connection, all data is divided into packets before being sent. These data packets are then encrypted with AES-256 bit. This is a complex and computationally intensive step. After the encryption, more control information is set before the data (Header), so due to additional information every packet is bigger as it originally was. This so-called “Overhead” is proportionally bigger, the more small packages are sent, since the control information have a fixed size regardless of the size of the original packets. For example, at CyberGhost (via OpenVPN) this takes approximately 50 bytes per packet (it varies depending on the setting for encryption, authentication etc.).

bike

The size of the data packets depends, among other things, on the following: over which servers are these sent and which packets size does the remote station accepts (MTU).
At the measurement of speed tests with active VPN connection is measured only how many user data can be transmitted over a period of time, therefore the above-mentioned Overhead is not measured.

So before you ask us why do you have small speed on your servers, it’s important to define „small“. Should you reach on all servers speeds less than 4 Mbit, although your internet connection can do far more (you can test this on speedtest.net), you may assume then there is a problem on your PC. To check this, please test the VPN connection with sufficiently different servers at different locations (at least 3). If the results are all over bad, it means there is a problem on your PC.

You can read all the explanation of the speed problems here, on our forum:
https://board.cyberghostvpn.com/cyberghost-vpn-english-boards/announcements/5290-what-to-do-when-you-have-speed-problems/.

We love feedback, so feel free to comment on the theme.

CEO-Blog: The story behind my tin foil hat video

Tin foil hat

If you think a tin foil hat makes you look silly, I totally approve that. And if you wonder how I came to this point, here’s the story:

As Edward Snowden exposed the NSA program Prism, I was surprised to find out that reality is far worse than any science fiction scenario or conspiracy theory. Even as a co-founder and CEO of a VPN company, I found the scale of these operations through an US government agency hard to believe until everything was confirmed and approved. Then, the first picture that popped into my mind were these people wearing tin foil hats designed to block their thoughts from being intercepted and  controlled. And for the first time I could really empathize with them.

Then, it all got even worse with Tempora, the program assigned with the full record of all internet traffic through the British secret service, GCHQ.  And from there on it was pretty clear that Prism and Tempora are just small pieces of the puzzle and maybe by the end we’ll all end up wearing tin foil hats.

The next level was to realize that our politicians are either not willing or able to defend our basic human rights, such as privacy. Then I heard Barak Obama, the Nobel Peace Prize Laureate reacting to the scandal by stating that we can’t have 100% security and 100% privacy. In other words, we all should have 0% privacy to maybe get a bit more security. Hans-Peter Uhl, the German spokesman for interior security of the CDU/CSU faction in the Bundestag says that the state anyway can’t help and people should encrypt their data by their own, if they want to have privacy. Sounded like they were making fun of each and every single one of us.

I talked to a lot of people in the last weeks about the above mentioned topics and I got a lot of replies, ranging from “yes, I always knew that” or “Your fault, if you use Facebook” to“I have nothing to hide” – but one reaction was always the same: “What can we do? Nothing.” And I thought that this is not true. We can do something. We can’t wear a tin foil hat. Or we shouldn’t. Seriously, that thing looks silly. But CyberGhost VPN is a great tool for locking your metadata away from this massive violation of privacy! Use it instead of a tin foil hat and take your privacy seriously.

And in response to that I put my tin foil hat on to show the world that a VPN works like a charm:

 Tin Foil Hat Video

Don’t forget: Here at CyberGhost, we believe that privacy is for everyone and with our current campaign, we’ve been striving to make it accessible and convenient.

You just have to go on www.worthofprivacy.com, decide how much your privacy is worth to you and we deliver you 12 month of CyberGhost VPN with no questions asked.