Page 23 - index
P. 23







A few years back, there was little interest in IPv6 traffic because of its low distribution, but in
modern Internet times it’s steadily increasing and, if not supported or blocked, makes it easy to
sniff a user’s data such as the websites one is visiting.


What can be done to protect user’s online anonymity and privacy?

Anonymity should be the core business for every VPN provider and therefore any association
between public IP and real IP should be avoided.

CyberGhost offers many-to-1 NAT, which means that one IP is used by 40 users, not just 1
which significantly increases anonymity.

Most VPN providers have a 1-to-1 translation of IP address which increases chances of
trackable IP’s.

CyberGhost VPN enables an Anti-Fingerprinting system that should be able to block all the
known parameters of one’s online presence such as: User Agent (browser version, type, and
language, Operating system,), enabled cookies, System fonts, and Plugin details.

Despite the anti-fingerprinting measures taken, all the mentioned specifications should be
translated into an untraceable online experience guaranteeing an impossible correlation of the
browser information and user.

Another feature is the Advanced Anonymization Test, which makes sure that all traffic going out
from your PC is routed through the encrypted CyberGhost VPN network.

Users might experience issues when their Internet suddenly disconnects and their connections
are no longer secured.

In order to avoid unsecured connections, a VPN should warn users when disconnected.

One of the few commercial VPN’s that still covers all the mentioned points is CyberGhost VPN.


About Cyberghost

Founded 2011 in Bucharest, Romania, CyberGhost S.R.L. is the creator of one of the world's
most reliable privacy and security solutions in the world. The company secures and anonymizes
the online presence of over 5 million users across the globe.

CyberGhost S.R.L. defends privacy as a basic human right, being first in the industry to publish
a transparency report while building new user-oriented crypto-technology for the future.


23 Cyber Warnings E-Magazine – August 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   18   19   20   21   22   23   24   25   26   27   28