NoGoolag
4.54K subscribers
13.2K photos
6.93K videos
587 files
14.1K links
Live free!

πŸ“‘ @NoGoolag

FAQ:
http://t.me/NoGoolag/169

β˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

πŸ“‘ @Libreware

πŸ“‘ @TakeBackOurTech

🦊 @d3_works

πŸ“š @SaveAlexandria

πŸ’― % satire OSINT
Download Telegram
OpenVPN vs IPSec, WireGuard, L2TP, & IKEv2 (VPN Protocols 2019)

What are VPN protocols and why do you need to understand the different options?
β€” What is
IPSec?
πŸ‘‰
https://t.me/BlackBox_Archiv/66

β€” What is IKEv2/IPSec?
β€” L2TP/
IPSec
πŸ‘‰
https://t.me/BlackBox_Archiv/67

β€”WireGuard
β€” PPTP
β€” SSTP
πŸ‘‰
https://t.me/BlackBox_Archiv/68

β€” OpenVPN UDP vs OpenVPN TCP
β€” What is the best VPN protocol?
β€” VPN protocols conclusion
πŸ‘‰
https://t.me/BlackBox_Archiv/69

#OpenVPN #IPSec #L2TP #IKEv2 #WireGuard #guide
πŸ“‘ @cRyPtHoN_INFOSEC_DE
πŸ“‘ @cRyPtHoN_INFOSEC_EN
SECURING_IPSEC_VIRTUAL_PRIVATE_NETWORKS_EXECUTIVE_SUMMARY_2020_07.PDF
224.8 KB
National Security Agency |Cybersecurity Information

Securing
IPsec Virtual Private Networks

Many organizations currently utilizeIP Security (IPsec) Virtual Private Networks (VPNs) to connect remote sites andenable telework capabilities. These connections use cryptographytoprotect sensitive information that traversesuntrusted networks. To protect this trafficand ensure data confidentiality, it is critical that these VPNs use strong cryptography.This guidance identifiescommon VPN misconfigurations andvulnerabilities.

πŸ‘€ PDF:
https://media.defense.gov/2020/Jul/02/2002355625/-1/-1/0/SECURING_IPSEC_VIRTUAL_PRIVATE_NETWORKS_EXECUTIVE_SUMMARY_2020_07_01_FINAL_RELEASE.PDF

#nsa #cybersecurity #IPsec #vpn #information #guide #pdf
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘@cRyPtHoN_INFOSEC_EN
πŸ“‘@NoGoolag
πŸ“‘@BlackBox
Don't use VPN services. (For anything else than their intended purpose, which is NOT anonymity)

https://schub.wtf/blog/2019/04/08/very-precarious-narrative.html

https://gist.github.com/joepie91/5a9909939e6ce7d09e29

TL;DR: Using a VPN does not make you anonymous and you shouldn't trust "no log policies".

Use Tor for browsing.

VPN protocols:

OpenVPN vs IPSec, WireGuard, L2TP, & IKEv2 (VPN Protocols 2019)

What are VPN protocols and why do you need to understand the different options?
β€” What is IPSec?
https://t.me/BlackBox_Archiv/66

β€” What is IKEv2/IPSec?
β€” L2TP/IPSec
https://t.me/BlackBox_Archiv/67

β€”WireGuard
β€” PPTP
β€” SSTP
https://t.me/BlackBox_Archiv/68

β€” OpenVPN UDP vs OpenVPN TCP
β€” What is the best VPN protocol?
β€” VPN protocols conclusion
https://t.me/BlackBox_Archiv/69

Why you should not use Tor with VPN (neither Tor over VPN nor VPN over Tor, unless you have some special needs or you cannot access Tor even using bridges):
https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-2-onion-recipes-vpn-not-required

Another POV on the matter:
https://matt.traudt.xyz/posts/you-want-tor-24tFBCJV.html

https://matt.traudt.xyz/p/mRikAa4h.html

#OpenVPN #IPSec #L2TP #IKEv2 #WireGuard #guide