Emphasizing that internet users all over the world use VPNs or change DNS to bypass access restrictions, Ferhat Seven stated that these methods carry risks in many ways.
Stating that some data can be stored or used against third parties, Seven said, “VPN means virtual private network in Turkish. The point that virtual private network means is that your data is encrypted on the internet and sent anonymously to another server and this data allows you to connect to the internet mutually. What kind of environment do you enter when you connect? You provide the internet to your applications anonymously without any geographical restrictions. Is VPN secure? The question immediately comes to mind. You can receive and use internet data in another country, so how is this secured or is this secure? Can the VPN setting I get for free provide security for me? At this point, you can provide internet through applications established by many VPN companies. But this internet provision can store some data in third parties or be used against you. With this information, it can be said that. The VPN settings here bring many factors with them. There is a possibility that your data will be stolen, there is a possibility that your data will be processed, it can provide a redirection reputation to third parties or cookies. We can think about this issue as follows. Some complaints about VPN security provide its security. “It can provide two-factor or open cloud clouding. But that doesn’t mean your data won’t be stored or used against you,” he said.
Following the restriction of social media platform Instagram in Turkey, users have recently increased the use of social network provider VPN, but not all VPNs are secure and personal information can be copied, Seven stated, “If a different application area is desired to be developed for VPN, there is THOR, there are proxy network providers, there is security shell, there are private network systems. So what types are currently used today? We play with VPN and DNS settings. After playing with VPN and DNS settings, we somehow provide our data to the other party. But there are THOR networks. This is also a hidden factor. It progresses anonymously. When we provide these, that is, when we use these applications, the following may come to mind. Do these provide security? Can they protect my data? questions may come to mind. These questions can both be points where you are advantageous. You can process your data, your work, and indeed, when it comes to the security of your data, it may create some disadvantages. For example, you downloaded a software, a third-party software in VPN settings or THOR settings, you normally download a VPN application, but an application comes with it in the background. And it can copy your data, store it within itself and present it to you or sell it to someone else. This poses a great danger,” he said.
“YOUR BANKING INFORMATION CAN BE STOLEN”
Seven stated that if insecure network providers are used, personal information and bank information can be stolen and used against people through different applications running in the background and third-party applications running in the background, and concluded his words as follows:
“As it is known in the 21st century, we shop online. After shopping online, we enter our credit card information. Is there a possibility that our credit card information can be copied via VPN? If a third party software is running in the background, this definitely means that the third party cookies have seen this or that it has been copied. Of course, you can understand the possibility that your information has been stolen by contacting your bank management. Or you can understand it thanks to a notification you receive. This can affect many results. For example, considering that you are using a postpaid phone, some payments can be reflected on your bill and some VPNs can spread your daily cost over a month and you can encounter high bills. In other words, as you know, we use many social networks. We enter some of our passwords in these social networks. After entering these passwords, the third party software working through VPN can copy and run them. After running this within itself, it can log in wherever it wants in any way it wants. The following question may come to mind. We have used VPN now, can they get our information? “Can it copy my own cellular VPN settings or DNS settings? If you use a free or unsecured VPN, the following may happen. When the copying is done, it can connect to your computer from another country at any time and use it as its own internet server. This poses a great danger.”