<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security May 2018</title>
	<atom:link href="http://www.epanorama.net/blog/2018/05/01/cyber-security-may-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/05/01/cyber-security-may-2018/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 20 Apr 2026 08:56:16 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/05/01/cyber-security-may-2018/comment-page-6/#comment-1593758</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 09 Jun 2018 10:36:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177489#comment-1593758</guid>
		<description><![CDATA[Washington Post: 	
China hacked a US Navy contractor early this year and stole 614GB of classified data, including plans for a supersonic anti-ship missile for US submarines  —  Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related … 
http://www.washingtonpost.com/world/national-security/china-hacked-a-navy-contractor-and-secured-a-trove-of-highly-sensitive-data-on-submarine-warfare/2018/06/08/6cc396fa-68e6-11e8-bea7-c8eb28bc52b1_story.html

Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to undersea warfare — including secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020, according to American officials. 

The breaches occurred in January and February, the officials said, speaking on the condition of anonymity to discuss an ongoing investigation.

The officials did not identify the contractor.

Taken were 614 gigabytes of material relating to a closely held project known as Sea Dragon, as well as signals and sensor data, submarine radio room information relating to cryptographic systems, and the Navy submarine development unit’s electronic warfare library.

The data stolen was of a highly sensitive nature despite being housed on the contractor’s unclassified network.

The breach is part of China’s long-running effort to blunt the U.S. advantage in military technology and become the preeminent power in East Asia.]]></description>
		<content:encoded><![CDATA[<p>Washington Post:<br />
China hacked a US Navy contractor early this year and stole 614GB of classified data, including plans for a supersonic anti-ship missile for US submarines  —  Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related …<br />
<a href="http://www.washingtonpost.com/world/national-security/china-hacked-a-navy-contractor-and-secured-a-trove-of-highly-sensitive-data-on-submarine-warfare/2018/06/08/6cc396fa-68e6-11e8-bea7-c8eb28bc52b1_story.html" rel="nofollow">http://www.washingtonpost.com/world/national-security/china-hacked-a-navy-contractor-and-secured-a-trove-of-highly-sensitive-data-on-submarine-warfare/2018/06/08/6cc396fa-68e6-11e8-bea7-c8eb28bc52b1_story.html</a></p>
<p>Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to undersea warfare — including secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020, according to American officials. </p>
<p>The breaches occurred in January and February, the officials said, speaking on the condition of anonymity to discuss an ongoing investigation.</p>
<p>The officials did not identify the contractor.</p>
<p>Taken were 614 gigabytes of material relating to a closely held project known as Sea Dragon, as well as signals and sensor data, submarine radio room information relating to cryptographic systems, and the Navy submarine development unit’s electronic warfare library.</p>
<p>The data stolen was of a highly sensitive nature despite being housed on the contractor’s unclassified network.</p>
<p>The breach is part of China’s long-running effort to blunt the U.S. advantage in military technology and become the preeminent power in East Asia.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/05/01/cyber-security-may-2018/comment-page-6/#comment-1592695</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 31 May 2018 17:16:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177489#comment-1592695</guid>
		<description><![CDATA[Devin Coldewey / TechCrunch: 	
Government investigation finds 73% of federal agencies at risk of being unable to detect data access attempts, 84% fail at encrypting data at rest, more

Government investigation finds federal agencies failing at cybersecurity basics
https://techcrunch.com/2018/05/30/government-investigation-finds-federal-agencies-failing-at-cybersecurity-basics/

The Office of Management and Budget reports that the federal government is a shambles — cybersecurity-wise, anyway. Finding little situational awareness, few standard processes for reporting or managing attacks and almost no agencies adequately performing even basic encryption, the OMB concluded that “the current situation is untenable.”

All told, nearly three quarters of federal agencies have cybersecurity programs that qualified as either “at risk” (significant gaps in security) or “high risk” (fundamental processes not in place).

1. “Agencies do not understand and do not have the resources to combat the current threat environment.”

2. “Agencies do not have standardized cybersecurity processes and IT capabilities.”

3. “Agencies lack visibility into what is occurring on their networks, and especially lack the ability to detect data exfiltration.”

4. “Agencies lack standardized and enterprise-wide processes for managing cybersecurity risks”

73 percent can’t detect attempts to access large volumes of data. 
84 percent of agencies failed to meet goals for encrypting data at rest. 

https://www.whitehouse.gov/wp-content/uploads/2018/05/Cybersecurity-Risk-Determination-Report-FINAL_May-2018-Release.pdf]]></description>
		<content:encoded><![CDATA[<p>Devin Coldewey / TechCrunch:<br />
Government investigation finds 73% of federal agencies at risk of being unable to detect data access attempts, 84% fail at encrypting data at rest, more</p>
<p>Government investigation finds federal agencies failing at cybersecurity basics<br />
<a href="https://techcrunch.com/2018/05/30/government-investigation-finds-federal-agencies-failing-at-cybersecurity-basics/" rel="nofollow">https://techcrunch.com/2018/05/30/government-investigation-finds-federal-agencies-failing-at-cybersecurity-basics/</a></p>
<p>The Office of Management and Budget reports that the federal government is a shambles — cybersecurity-wise, anyway. Finding little situational awareness, few standard processes for reporting or managing attacks and almost no agencies adequately performing even basic encryption, the OMB concluded that “the current situation is untenable.”</p>
<p>All told, nearly three quarters of federal agencies have cybersecurity programs that qualified as either “at risk” (significant gaps in security) or “high risk” (fundamental processes not in place).</p>
<p>1. “Agencies do not understand and do not have the resources to combat the current threat environment.”</p>
<p>2. “Agencies do not have standardized cybersecurity processes and IT capabilities.”</p>
<p>3. “Agencies lack visibility into what is occurring on their networks, and especially lack the ability to detect data exfiltration.”</p>
<p>4. “Agencies lack standardized and enterprise-wide processes for managing cybersecurity risks”</p>
<p>73 percent can’t detect attempts to access large volumes of data.<br />
84 percent of agencies failed to meet goals for encrypting data at rest. </p>
<p><a href="https://www.whitehouse.gov/wp-content/uploads/2018/05/Cybersecurity-Risk-Determination-Report-FINAL_May-2018-Release.pdf" rel="nofollow">https://www.whitehouse.gov/wp-content/uploads/2018/05/Cybersecurity-Risk-Determination-Report-FINAL_May-2018-Release.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/05/01/cyber-security-may-2018/comment-page-6/#comment-1592694</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 31 May 2018 17:13:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177489#comment-1592694</guid>
		<description><![CDATA[Lorenzo Franceschi-Bicchierai / Motherboard:
Researcher discovers bug in Valve&#039;s platform, present for 10 years, that exposed all 125M users to exploitation until Valve fixed it in March 2018

An Exploit Left Millions of Steam Users Vulnerable for the Past 10 Years
https://motherboard.vice.com/en_us/article/9k8qv5/steam-exploit-left-users-vulnerable-for-10-years

A security researcher found a serious vulnerability that allowed hackers to take control of a Steam user’s computer. 

Hackers could have taken advantage of a nasty bug in the hugely popular video game platform Steam to take over victims’ computers. 

 “This bug could have been used as the basis for a highly reliable exploit,” Court wrote. “This was a very simple bug, made relatively straightforward to exploit due to a lack of modern exploit protections.”

In other words, by exploiting this bug, hackers could have executed code on the victim’s machine, effectively taking full control over it. 

Court said that the takeaway for this bug is that developers need to constantly review old and aging code and make sure it conforms to “modern security standards.”

Court also published a proof-of-concept video on YouTube in which he launches the calculator app (a standard trick for a hacking demo) on the target’s system taking advantage of this bug.]]></description>
		<content:encoded><![CDATA[<p>Lorenzo Franceschi-Bicchierai / Motherboard:<br />
Researcher discovers bug in Valve&#8217;s platform, present for 10 years, that exposed all 125M users to exploitation until Valve fixed it in March 2018</p>
<p>An Exploit Left Millions of Steam Users Vulnerable for the Past 10 Years<br />
<a href="https://motherboard.vice.com/en_us/article/9k8qv5/steam-exploit-left-users-vulnerable-for-10-years" rel="nofollow">https://motherboard.vice.com/en_us/article/9k8qv5/steam-exploit-left-users-vulnerable-for-10-years</a></p>
<p>A security researcher found a serious vulnerability that allowed hackers to take control of a Steam user’s computer. </p>
<p>Hackers could have taken advantage of a nasty bug in the hugely popular video game platform Steam to take over victims’ computers. </p>
<p> “This bug could have been used as the basis for a highly reliable exploit,” Court wrote. “This was a very simple bug, made relatively straightforward to exploit due to a lack of modern exploit protections.”</p>
<p>In other words, by exploiting this bug, hackers could have executed code on the victim’s machine, effectively taking full control over it. </p>
<p>Court said that the takeaway for this bug is that developers need to constantly review old and aging code and make sure it conforms to “modern security standards.”</p>
<p>Court also published a proof-of-concept video on YouTube in which he launches the calculator app (a standard trick for a hacking demo) on the target’s system taking advantage of this bug.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/05/01/cyber-security-may-2018/comment-page-6/#comment-1592684</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 31 May 2018 11:16:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177489#comment-1592684</guid>
		<description><![CDATA[‘SIGNIFICANT’ FBI ERROR REIGNITES DATA ENCRYPTION DEBATE
https://www.wired.com/story/significant-fbi-error-reignites-data-encryption-debate/


SUBSCRIBE

AUTHOR: LILY HAY NEWMANLILY HAY NEWMAN
SECURITY
05.23.1807:02 PM
‘SIGNIFICANT’ FBI ERROR REIGNITES DATA ENCRYPTION DEBATE

FBI HeadquartersT.J. KIRKPATRICK/BLOOMBERG/GETTY IMAGES
LAW ENFORCEMENT AGENCIES including the FBI have long criticized data encryption as a threat to their ability to fight crime. They argue that encryption allows bad actors to &quot;go dark,&quot; impeding agents’ ability to access the data of suspects, even with court orders or warrants. After years of raising the alarm about the going-dark problem, though, officials have yet to convince privacy advocates that undermining encryption protections would do more good than harm. And critics say that the FBI in particular has failed to show the problem is significant.

A Tuesday report in the Washington Post fueled this debate, revealing that the FBI had vastly overstated the number of devices to which it could not gain access.]]></description>
		<content:encoded><![CDATA[<p>‘SIGNIFICANT’ FBI ERROR REIGNITES DATA ENCRYPTION DEBATE<br />
<a href="https://www.wired.com/story/significant-fbi-error-reignites-data-encryption-debate/" rel="nofollow">https://www.wired.com/story/significant-fbi-error-reignites-data-encryption-debate/</a></p>
<p>SUBSCRIBE</p>
<p>AUTHOR: LILY HAY NEWMANLILY HAY NEWMAN<br />
SECURITY<br />
05.23.1807:02 PM<br />
‘SIGNIFICANT’ FBI ERROR REIGNITES DATA ENCRYPTION DEBATE</p>
<p>FBI HeadquartersT.J. KIRKPATRICK/BLOOMBERG/GETTY IMAGES<br />
LAW ENFORCEMENT AGENCIES including the FBI have long criticized data encryption as a threat to their ability to fight crime. They argue that encryption allows bad actors to &#8220;go dark,&#8221; impeding agents’ ability to access the data of suspects, even with court orders or warrants. After years of raising the alarm about the going-dark problem, though, officials have yet to convince privacy advocates that undermining encryption protections would do more good than harm. And critics say that the FBI in particular has failed to show the problem is significant.</p>
<p>A Tuesday report in the Washington Post fueled this debate, revealing that the FBI had vastly overstated the number of devices to which it could not gain access.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/05/01/cyber-security-may-2018/comment-page-6/#comment-1592653</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 May 2018 20:50:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177489#comment-1592653</guid>
		<description><![CDATA[Paul Elias / Associated Press: 	
US judge sentences Toronto man to five years in prison and fines him $250K for using data stolen in giant Yahoo data breach to hack into private email accounts

Hacker gets 5 years for Russian-linked Yahoo security breach
https://www.apnews.com/2664cefa070e470584a59bd56f8688a5/Hacker-sentenced-to-5-years-for-major-Yahoo-security-breach

A young computer hacker who prosecutors say unwittingly worked with a Russian spy agency was sentenced to five years in prison Tuesday for using data stolen in a massive Yahoo data breach to gain access to private emails.]]></description>
		<content:encoded><![CDATA[<p>Paul Elias / Associated Press:<br />
US judge sentences Toronto man to five years in prison and fines him $250K for using data stolen in giant Yahoo data breach to hack into private email accounts</p>
<p>Hacker gets 5 years for Russian-linked Yahoo security breach<br />
<a href="https://www.apnews.com/2664cefa070e470584a59bd56f8688a5/Hacker-sentenced-to-5-years-for-major-Yahoo-security-breach" rel="nofollow">https://www.apnews.com/2664cefa070e470584a59bd56f8688a5/Hacker-sentenced-to-5-years-for-major-Yahoo-security-breach</a></p>
<p>A young computer hacker who prosecutors say unwittingly worked with a Russian spy agency was sentenced to five years in prison Tuesday for using data stolen in a massive Yahoo data breach to gain access to private emails.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/05/01/cyber-security-may-2018/comment-page-6/#comment-1592652</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 May 2018 20:49:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177489#comment-1592652</guid>
		<description><![CDATA[Deb Riechmann / Associated Press: 	
FBI and DHS say North Korea used two pieces of malware to target US infrastructure and aerospace, financial, and media companies over nine years

US says North Korea behind malware attacks
https://www.apnews.com/9fb4327df4994d93a3b5c49ee227b2e0/US-says-North-Korea-behind-malware-attacks]]></description>
		<content:encoded><![CDATA[<p>Deb Riechmann / Associated Press:<br />
FBI and DHS say North Korea used two pieces of malware to target US infrastructure and aerospace, financial, and media companies over nine years</p>
<p>US says North Korea behind malware attacks<br />
<a href="https://www.apnews.com/9fb4327df4994d93a3b5c49ee227b2e0/US-says-North-Korea-behind-malware-attacks" rel="nofollow">https://www.apnews.com/9fb4327df4994d93a3b5c49ee227b2e0/US-says-North-Korea-behind-malware-attacks</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/05/01/cyber-security-may-2018/comment-page-6/#comment-1592647</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 May 2018 20:44:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177489#comment-1592647</guid>
		<description><![CDATA[Catalin Cimpanu / BleepingComputer.com:
Ubiquitous code repository project Git patches two flaws, including one letting an attacker execute code on systems that recursively cloned a malicious Git repo

Malicious Git Repository Can Lead to Code Execution on Remote Systems
https://www.bleepingcomputer.com/news/security/malicious-git-repository-can-lead-to-code-execution-on-remote-systems/

The developers behind Git and various companies providing Git repository hosting services have pushed out a fix to patch a dangerous vulnerability in the Git source code versioning software.

The fix is included with Git 2.17.1, which patches two security bugs, CVE-2018-11233 and CVE-2018-11235.]]></description>
		<content:encoded><![CDATA[<p>Catalin Cimpanu / BleepingComputer.com:<br />
Ubiquitous code repository project Git patches two flaws, including one letting an attacker execute code on systems that recursively cloned a malicious Git repo</p>
<p>Malicious Git Repository Can Lead to Code Execution on Remote Systems<br />
<a href="https://www.bleepingcomputer.com/news/security/malicious-git-repository-can-lead-to-code-execution-on-remote-systems/" rel="nofollow">https://www.bleepingcomputer.com/news/security/malicious-git-repository-can-lead-to-code-execution-on-remote-systems/</a></p>
<p>The developers behind Git and various companies providing Git repository hosting services have pushed out a fix to patch a dangerous vulnerability in the Git source code versioning software.</p>
<p>The fix is included with Git 2.17.1, which patches two security bugs, CVE-2018-11233 and CVE-2018-11235.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/05/01/cyber-security-may-2018/comment-page-6/#comment-1592632</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 May 2018 19:30:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177489#comment-1592632</guid>
		<description><![CDATA[NPM Fails Worldwide With &quot;ERR! 418 I&#039;m a Teapot&quot; Error
https://www.bleepingcomputer.com/news/technology/npm-fails-worldwide-with-err-418-im-a-teapot-error/

Users of the NPM JavaScript package manager were greeted by a weird error yesterday evening, as their consoles and applications spewed a message of &quot;ERR! 418 I&#039;m a teapot&quot; whenever they tried to update or install a new JavaScript/Node.js package.]]></description>
		<content:encoded><![CDATA[<p>NPM Fails Worldwide With &#8220;ERR! 418 I&#8217;m a Teapot&#8221; Error<br />
<a href="https://www.bleepingcomputer.com/news/technology/npm-fails-worldwide-with-err-418-im-a-teapot-error/" rel="nofollow">https://www.bleepingcomputer.com/news/technology/npm-fails-worldwide-with-err-418-im-a-teapot-error/</a></p>
<p>Users of the NPM JavaScript package manager were greeted by a weird error yesterday evening, as their consoles and applications spewed a message of &#8220;ERR! 418 I&#8217;m a teapot&#8221; whenever they tried to update or install a new JavaScript/Node.js package.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/05/01/cyber-security-may-2018/comment-page-6/#comment-1592619</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 May 2018 13:15:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177489#comment-1592619</guid>
		<description><![CDATA[USA needs law &#039;a lot like GDPR&#039; says Salesforce CEO Marc Benioff
As his company smashes Q1 2019
https://www.theregister.co.uk/2018/05/30/salesforce_q1_2019/

Salesforce CEO Marc Benioff thinks the USA needs “a national privacy law … that probably looks a lot like GDPR.”

“This is going to help our industry,” he said on an earnings call for Salesforces Q1 2019 results. “It&#039;s going to set the guardrails around trust, around safety. It&#039;s going to provide the ability for the customers to interact with great next generation technologies in a safe way.”]]></description>
		<content:encoded><![CDATA[<p>USA needs law &#8216;a lot like GDPR&#8217; says Salesforce CEO Marc Benioff<br />
As his company smashes Q1 2019<br />
<a href="https://www.theregister.co.uk/2018/05/30/salesforce_q1_2019/" rel="nofollow">https://www.theregister.co.uk/2018/05/30/salesforce_q1_2019/</a></p>
<p>Salesforce CEO Marc Benioff thinks the USA needs “a national privacy law … that probably looks a lot like GDPR.”</p>
<p>“This is going to help our industry,” he said on an earnings call for Salesforces Q1 2019 results. “It&#8217;s going to set the guardrails around trust, around safety. It&#8217;s going to provide the ability for the customers to interact with great next generation technologies in a safe way.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/05/01/cyber-security-may-2018/comment-page-6/#comment-1592612</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 May 2018 12:59:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177489#comment-1592612</guid>
		<description><![CDATA[26 of the 115 most popular VPNs are secretly keeping tabs on you
https://thenextweb.com/security/2018/03/27/26-popular-115-vpns-keeping-tabs-saying-theyre-not/

A recent investigation into 115 of the world’s most popular VPN services revealed that many are antithetical to their stated claims. To build trust, providers make promises not to track users through logs or other identifying information. But as a popular VPN comparison site found out, this isn’t always true.

The Best VPN recently peeked under the hood of over 100 of the biggest VPN services. All told, 26 of them collect three or more important log files that could contain personal and identifying information — things like your IP address, location, bandwidth data, and connection timestamps.]]></description>
		<content:encoded><![CDATA[<p>26 of the 115 most popular VPNs are secretly keeping tabs on you<br />
<a href="https://thenextweb.com/security/2018/03/27/26-popular-115-vpns-keeping-tabs-saying-theyre-not/" rel="nofollow">https://thenextweb.com/security/2018/03/27/26-popular-115-vpns-keeping-tabs-saying-theyre-not/</a></p>
<p>A recent investigation into 115 of the world’s most popular VPN services revealed that many are antithetical to their stated claims. To build trust, providers make promises not to track users through logs or other identifying information. But as a popular VPN comparison site found out, this isn’t always true.</p>
<p>The Best VPN recently peeked under the hood of over 100 of the biggest VPN services. All told, 26 of them collect three or more important log files that could contain personal and identifying information — things like your IP address, location, bandwidth data, and connection timestamps.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
