Private Internet Access Leaves Russia, Following Encryption Ban And Seized Servers
from the yikes dept
A few years ago, I got to travel to Moscow to present some of our research at an event. Having heard more than a few stories about internet access issues in Russia, before going I made sure that I had three separate VPNs lined up in case any of them were blocked. I ended up using Private Internet Access -- which was already quite well-known and reliable. That's my regular VPN, but I had been worried that maybe it wouldn't work in Moscow. I was wrong. It worked flawlessly. But apparently that's no longer the case. Just after Russia's new surveillance bill passed, complete with mandates for encryption backdoors and data retention (along with a demand that all encryption be openly accessible for the government within two weeks), apparently Russian officials seized Private Internet Access's servers in Russia, causing the company to send an email to all its subscribers, announcing what happened, what it was doing to fix things... and also that it was no longer doing business in Russia.To Our Beloved Users,Of course, the end result of this is going to make Russian internet users a lot less safe. The war on encryption is a really dumb idea, and kudos to PIA for taking a stand.
The Russian Government has passed a new law that mandates that every provider must log all Russian internet traffic for up to a year. We believe that due to the enforcement regime surrounding this new law, some of our Russian Servers (RU) were recently seized by Russian Authorities, without notice or any type of due process. We think it’s because we are the most outspoken and only verified no-log VPN provider.
Luckily, since we do not log any traffic or session data, period, no data has been compromised. Our users are, and will always be, private and secure.
Upon learning of the above, we immediately discontinued our Russian gateways and will no longer be doing business in the region.
To make it clear, the privacy and security of our users is our number one priority. For preventative reasons, we are rotating all of our certificates. Furthermore, we’re updating our client applications with improved security measures to mitigate circumstances like this in the future, on top of what is already in place. In addition, our manual configurations now support the strongest new encryption algorithms including AES-256, SHA-256, and RSA-4096.
All Private Internet Access users must update their desktop clients at https://www.privateinternetaccess.com/pages/client-support/ and our Android App at Google Play. Manual openvpn configurations users must also download the new config files from the client download page.
We have decided not to do business within the Russian territory. We’re going to be further evaluating other countries and their policies.
In any event, we are aware that there may be times that notice and due process are forgone. However, we do not log and are default secure against seizure.
If you have any questions, please contact us at helpdesk@privateinternetaccess.com.
Thank you for your continued support and helping us fight the good fight.
Sincerely,
Private Internet Access Team
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: backdoors, encryption, russia, servers, vpn
Companies: private internet access
Reader Comments
Subscribe: RSS
View by: Time | Thread
Very Satisfied PIA client
I will say that most of the time I use PIA via a router that exists primarily to supply the VPN services, as well as to offload the encrypt/decrypt to a different processor. I do not know if this would work the same with a desktop client, which is available for PIA, Linux, Android, and Windows for sure, probably MAC too.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Travel destinations
[ link to this | view in chronology ]
Re: Travel destinations
[ link to this | view in chronology ]
Love of Control
All it's going to take is one more small, sculpted act to start-up martial law, and we will never return. Stop worrying about that one-tree that fell, you better notice how close we are to all the forest burning up in a flash-fire.
[ link to this | view in chronology ]
Re: Love of Control
I think Western nations will go about it in a little big of a different way, but to the same general end result.
I think in the US it will be done much more along the lines of "you can have your encryptions and VPNs, but your connections will have to be entirely logged". It's to me one of the reasons why they are working so hard currently to strangle TOR.
I also think that there will be at some point the completion of the title II move to apply similar laws and structures that exist for other utilities to the internet. Particular in that is the personal liability of the account holder for how the service is used. This is how phone, water, and electrical services work, so the internet could (and possibly should) be the same. There may be some legal arguments against it, but title II status goes a long way down the road already without anyone realizing it.
Essentially, if a service provider masks who the true user is by providing a proxy or portal, then they would have to log by mac address and such, and retain those records for a given period of time.
It would change how free public wifi works. It would certainly change the legal landscape for leaving your wifi open for any schmuck to use.
SO you can keep your encryption, you can keep your VPNs, but understand that you are logged all the way.
My guess is by 2020.
[ link to this | view in chronology ]
Re: Love of Control
[ link to this | view in chronology ]
Re: Love of Control
[ link to this | view in chronology ]
Re: Love of Control
http://www.rense.com/general37/char.htm
[ link to this | view in chronology ]
Martial Law
Fascism, once started, is tough to sustain:
The upper echelons do love their cocaine.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
The War on Encryption
[ link to this | view in chronology ]
Re: The War on Encryption
If such a system only used public domain info, say sending random passages of Shakespeare then it would be recognized as encryption because it would still stand out as unusual.
If you used copyrighted works you go to jail for copyright infringement.
If it randomly used words/pixels to make up new content they would throw you in the mental ward since your incoherent babel clearly makes you nuts. It would also stand out as being encryption.
The solution is to just use encryption for everything. When every data stream is encrypted the stuff you really want to hide is now 'hidden in plain sight' like you suggest would work best.
[ link to this | view in chronology ]
Re: Re: The War on Encryption
Without the key, there would be no feasible way to tell there was anything in those unused sectors, compounded by there being a lot of Aunt Millie Bermuda vacation photo disc images out there.
And if I were running a terror / revolutionary / dissenting interests / book club, I'd make sure that most of my disc images I was sending out didn't include encrypted data.
This is tech already used in states more oppressive than ours. We don't need to invent it so much as make it available to everyone.
[ link to this | view in chronology ]
Re: Re: Re: The War on Encryption
Those flags are all that's necessary to start the process of breaking the encryption
[ link to this | view in chronology ]
Re: Re: The War on Encryption
Not saying they wouldn't try it but it's a LOT harder to make that a winning argument.
[ link to this | view in chronology ]
Re: Re: The War on Encryption
It's not only possible, but easy and commonly done right now. A huge number of people routinely post pictures they take themselves on social media sites. It's trivial to use steganographic software to embed encrypted data in them.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
The war on drugs allowed oppressive laws to be passed without an appreciable effect on the drug trade, the war on terror allowed more oppressive laws to be passed without an appreciable effect on terrorism, and this war on encryption will allow more oppressive laws to be passed.
It won't matter if you use encryption or not; if you don't, six lines typed in your hands will be used to hang you, if you do, you'll be hung anyway for 'refusing to decrypt/cooperate'.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]
I'm sure our day to day lives generate enough junk data to mask people's communications. For example, you could theoretically hide a text message inside a voice chat. While you're saying "I like pancakes" on the voice chat, you could weave an encrypted message into the digitized audio without affecting the sound quality noticeably. Technology like this already exists.
As a programmer, I've heard the term "security through obscurity" as an insult for the last couple decades, but obscurity probably isn't a terrible thing if you mix it with good security. I think privacy is going to be the next killer app.
So, congrats Russia, you're now the driving force behind what I'm sure will be many great innovations in encryption and just privacy in general. Fuck Russia--there's an app for that.
[ link to this | view in chronology ]
Re:
This is correct.
"Security through obscurity" is usually used to refer to two different serious errors in security:
1) Relying on secrecy alone to keep you secure. Over time, this fails in close to 100% of all cases.
2) Relying on crypto whose algorithm is a secret. Crypt is notoriously hard to do right, and it's incredibly easy to develop crypto that appears to be strong, but isn't. Secret algorithms don't gain you any security, but they do make it much more difficult to notice flaws in your crypto.
Now, using strong crypto in a way that is hard to notice (by combining it with steganography, for instance) does, in fact, increase your level of security. But you still must treat the crypto part of the scheme as if everyone will know it's there.
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]
regarding steganography
Let's not forget that this was a time when recorded music was generally only sold as albums (in physical form) and the term "MP3" was synonymous with "piracy." In the age before P2P networks, Bittorrent, commercial usenet services, or MegaUpload-type file hosting sites, steganography was the most reliable and safest way to host copyrighted music long term on the internet.
[ link to this | view in chronology ]
Dear US Govt:
[ link to this | view in chronology ]
Re: Dear US Govt:
The ones that leave would more likely be the smaller companies who tend to be more sensitive to their customer's needs and security. Exactly the ones we can least afford to lose.
[ link to this | view in chronology ]
Re: Re: Dear US Govt:
[ link to this | view in chronology ]
Ouch!
[ link to this | view in chronology ]
Re: Ouch!
[ link to this | view in chronology ]
[ link to this | view in chronology ]