<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Research &#8211; TrueVPN Blog</title>
	<atom:link href="https://blog.truevpns.com/category/research/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.truevpns.com</link>
	<description>The world&#039;s #1 Trusted VPN provider</description>
	<lastBuildDate>Mon, 07 Sep 2020 04:04:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.9.10</generator>

<image>
	<url>https://blog.truevpns.com/wp-content/uploads/2020/04/cropped-logo-app-1-32x32.png</url>
	<title>Research &#8211; TrueVPN Blog</title>
	<link>https://blog.truevpns.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>TrueVPN Uses AI in Cybersecurity Research</title>
		<link>https://blog.truevpns.com/truevpn-uses-ai-in-cybersecurity-research/</link>
		
		<dc:creator><![CDATA[TrueVPN]]></dc:creator>
		<pubDate>Mon, 07 Sep 2020 04:01:09 +0000</pubDate>
				<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[TrueVPN Uses AI in Cybersecurity Research]]></category>
		<guid isPermaLink="false">https://blog.truevpns.com/?p=459</guid>

					<description><![CDATA[Cyber crimes are not just limited to softwares installed on your computer or your smartphone, In this article we will explain how TrueVPN Uses AI in Cybersecurity Research to improve your security.]]></description>
										<content:encoded><![CDATA[
<p class="has-drop-cap">Although artificial intelligence and its subfield of machine learning have been applied in cybersecurity for some time, the speed of adoption is now accelerating. As threats evolve and IT environments get more complicated, AI-driven technology shows the potential of addressing new threats and risks that require machine speed rather than human speed.</p>



<p>So how TrueVPN Uses AI in Cybersecurity Research and Why?<br>We will talk about it in a minute, Keep reading.</p>



<h1>Background</h1>



<p>Cyber criminals pose a threat to all manner of organizations and businesses, and the customers and consumers who use them. Some of the numbers involved in the largest data breaches are staggering, with personal data concerning hundreds of thousands of individuals being leaked – each one potentially a new victim of fraud and other cybercrime.</p>



<h2>Networking Security</h2>



<p>Cyber crimes are not just limited to softwares installed on your computer or your smart-phone, Take traffic cameras in development countries as example, These cameras are powered with AI-based facial recognition software, of course the operation of these kind of systems depends on syncing data between cameras, software in the cloud, and here&#8217;s the issue.</p>



<p>What if these cloud infrastructures got hacked? Whoops!. <br>Of course, These systems are secured enough against criminals, but it&#8217;s really hard for ITs to track each packet passes through the network and of course more security means less functionality, and less security means more functionality!</p>



<p>Not to mention the risks of using a public WiFi network, And we already talked about <a href="https://blog.truevpns.com/the-risks-of-using-public-wifi-networks/" class="rank-math-link">The Risks of using a public WiFi network</a> in other article</p>



<h2>Privacy</h2>



<p>For example, If you reading this you been tracked and you probably don’t even know it.<br>You probably thinking, Who cares? i’m not important. They can watch what they wants ..etc</p>



<p><strong>That is what they wants you to believe</strong>. but the truth is. What if it’s for more than just ads or sales? What if there’s much larger scheme in place? That’s carefully put together to manipulate what you see, what you hear, and believe. In other words, You’re being <strong>brain watched</strong>.</p>



<p><strong>Your data is being sold is not the only problem.</strong></p>



<p>It’s also being sold for other reasons, worst reasons, <strong>You’re being profiled</strong>.<br>Wether it be political persuasion or what the men in black suits want people of your type to be looking at. But online is .. It’s Ultimate control, Rule of our society, Censorship and manipulation.</p>



<h1>AI in Cybersecurity</h1>



<p>Artificial intelligence (AI) and machine learning (ML) are playing an increasing role in cybersecurity, with security tools analyzing data from millions of cyber incidents, and using it to identify potential threats &#8212; an employee account acting strangely by clicking on phishing links, for example, or a new variant of malware or a bad behavior on a network. </p>



<p>Today, TrueVPN started to use an AI based algorithm to improve network security and user&#8217;s privacy, and of course the functionality of the algorithm only works on the device.</p>



<p>If you haven’t heard about TrueVPN, Click to <a href="https://blog.truevpns.com/why-you-should-use-truevpn/"><strong>Learn more about TrueVPN</strong></a></p>



<p>By using AI-based algorithm, we can secure our users from cyber threads, fraud, hackers and even data leaks, we will talk about how TrueVPN Uses AI in Cybersecurity Research in this article.</p>



<h1>TrueVPN&#8217;s AI</h1>



<p>TrueVPN AI is powered by Skytells&#8217;s DeepBrain AI as built-in feature included with every version of TrueVPN app, With TrueVPN AI your Internet traffic will be even more secure: A neural network based on the device continuously analyzes current Internet routing. Based on this our algorithm determines the most secure route through the Internet.</p>



<h3>Benefits from TrueVPN&#8217;s built-in AI</h3>



<ul><li>Chooses the VPN server closest to the destination</li><li>Increasing TrueVPN&#8217;s Firewall protection.</li><li>Identifying anomalies in network traffic or user behavior.</li><li>Traffic stays in the encrypted VPN network as long as possible</li><li>External VPN IP changes depending on the destination</li><li>In the best case, the traffic is not exposed to the Internet at all</li><li>The number of attack points is greatly reduced</li><li>Tracking users is more difficult</li><li>Mitigating the cybersecurity skills gap</li><li>Detecting online and other fraud</li><li>Dynamic: The algorithm learns and reacts if routing changes</li></ul>



<p>Your data is sent encrypted from one VPN server to the next. That means that the traffic outside the strongly encrypted VPN network is minimized. Additionally, since routing on the Internet is dynamic and changes regularly, TrueVPN AI automatically analyzes the current routing and determines the shortest route to the target server. Because of this, it is also not easily possible to predict which routes your traffic is using.</p>



<h1>Download TrueVPN</h1>



<p><a href="https://blog.truevpns.com/truevpn-rolls-out-dpi-bypass-mechanisms/" class="rank-math-link">TrueVPN</a> App is available for the following platforms</p>



<ul><li>Mac OS X</li><li>iPhone</li><li>iPad</li><li>iPod Touch</li></ul>



<figure class="wp-block-image is-resized"><a href="https://apps.apple.com/us/app/truevpn-best-vpn-adblocker/id1457492229" target="_blank" rel="noreferrer noopener"><img src="https://blog.truevpns.com/wp-content/uploads/2020/04/app-store.png" alt="" class="wp-image-341" width="253" height="77" srcset="https://blog.truevpns.com/wp-content/uploads/2020/04/app-store.png 328w, https://blog.truevpns.com/wp-content/uploads/2020/04/app-store-300x91.png 300w" sizes="(max-width: 253px) 100vw, 253px" /></a><figcaption>Download TrueVPN for iOS &amp; macOS</figcaption></figure>



<h1>Conclusion</h1>



<p>AI is very useful in cybersecurity, If you looking for a VPN with high-end encryption and premium features, TrueVPN is your best choice, You must use a <a href="https://blog.truevpns.com/the-story-behind-the-creation-of-truevpn/" class="rank-math-link">VPN</a> to protect your online activity, A VPN is a big must these days specially for people who uses public <a href="https://blog.truevpns.com/the-risks-of-using-public-wifi-networks/" class="rank-math-link">WiFi networks</a>.</p>



<h1>FAQ</h1>


<div id="rank-math-faq" class="rank-math-block">
<div class="rank-math-list ">
<div id="faq-question-1599450292428" class="rank-math-list-item">
<h3 class="rank-math-question ">Should I Trust TrueVPN?</h3>
<div class="rank-math-answer ">

<p>Choosing your best VPN provider isn’t that easy, it depends on many factors, We’ve an article to teach you <a href="https://blog.truevpns.com/the-risks-of-using-public-wifi-networks/"><strong>How to choose your best VPN provider</strong></a>.</p>

</div>
</div>
<div id="faq-question-1599450308709" class="rank-math-list-item">
<h3 class="rank-math-question ">Is TrueVPN Available for Windows?</h3>
<div class="rank-math-answer ">

<p>Unfortunately, TrueVPN isn&#8217;t available for windows at the moment, in the meantime you can use TrueVPN&#8217;s WireGuard servers on windows.</p>

</div>
</div>
<div id="faq-question-1599450377875" class="rank-math-list-item">
<h3 class="rank-math-question ">Is TrueVPN Free?</h3>
<div class="rank-math-answer ">

<p>Yes, TrueVPN is free and always will be, in addition to that, TrueVPN includes a premium subscriptions starts from $1.99.</p>

</div>
</div>
<div id="faq-question-1599450427192" class="rank-math-list-item">
<h3 class="rank-math-question ">How fast is TrueVPN?</h3>
<div class="rank-math-answer ">

<p>Yet, TrueVPN ranked the fastest VPN provider in the world.</p>

</div>
</div>
<div id="faq-question-1599450462799" class="rank-math-list-item">
<h3 class="rank-math-question ">How to Download TrueVPN on iPhone/macOS/iPad?</h3>
<div class="rank-math-answer ">

<p>You can <a rel="noreferrer noopener" href="https://apps.apple.com/us/app/truevpn-best-vpn-adblocker/id1457492229" target="_blank">download</a> TrueVPN on your iOS, iPadOS, macOS device from Apple’s AppStore.</p>

</div>
</div>
</div>
</div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>TrueVPN Rolls Out DPI Bypass Mechanisms!</title>
		<link>https://blog.truevpns.com/truevpn-rolls-out-dpi-bypass-mechanisms/</link>
		
		<dc:creator><![CDATA[TrueVPN]]></dc:creator>
		<pubDate>Mon, 04 May 2020 20:38:12 +0000</pubDate>
				<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[TrueVPN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[dpi]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[truevpn]]></category>
		<guid isPermaLink="false">https://blog.truevpns.com/?p=414</guid>

					<description><![CDATA[When you are living or staying in a restrictive country where personal rights are usually getting scrapped away, you will most likely have a problem when trying to access certain websites on the internet. Most of the time, the restrictive countries are enforcing their internet laws to their citizens, forcing them to follow the guidelines as laid out by the government.]]></description>
										<content:encoded><![CDATA[
<p class="has-drop-cap">When you are living or staying in a restrictive country where personal rights are usually getting scrapped away, you will most likely have a problem when trying to access certain websites on the internet. Most of the time, the restrictive countries are enforcing their internet laws to their citizens, forcing them to follow the guidelines as laid out by the government.</p>



<p>The government will totally control the people’s behavior over the internet by using the technology that won’t allow them to exercise their online privacy rights or personal freedom on the internet. One of the methods used by the restrictive government to block your online traffic is by using a system called DPI or <a href="https://blog.truevpns.com/what-is-deep-packet-inspection/" class="aioseop-link"><strong>Deep Packet Inspection</strong></a>.</p>



<p>What the <a href="https://blog.truevpns.com/what-is-deep-packet-inspection/" class="aioseop-link">DPI</a> system is doing is that it will analyze the internet traffic that is coming through your ISP. It will identify your traffic type and either allow the traffic to reach the internet or block it. If you are using the regular ISP traffic, the system will allow you to access the internet, while if you are using the VPN traffic, the system can recognize it and block your connection from reaching the internet. This is an advanced traffic monitoring system installed by the restrictive government to prevent people from using private connections and force them to follow the government’s internet regulations.</p>



<h2>Background</h2>



<p>As TrueVPN focuses on security and privacy, It&#8217;s clear that DPI is a huge issue!<br>When talking about privacy and security, We must consider that DPI that performed by some countries for <a href="https://blog.truevpns.com/what-is-vpn-blocking-and-how-to-bypass-it/" class="aioseop-link">VPN blocking</a> or any other political reason comes against user&#8217;s privacy.</p>



<p><strong>Why we consider it as a huge privacy issue?</strong><br>Alright, to answer that, we need to understand <a href="https://blog.truevpns.com/what-is-deep-packet-inspection/" class="aioseop-link">how Deep Packet Inspection works.</a></p>



<p>Well, <strong>Deep packet inspection</strong> evaluates the data part and the header of a <strong>packet</strong> that is transmitted through an <strong>inspection</strong> point, weeding out any non-compliance to protocol, spam, viruses, intrusions, and any other defined criteria to block the <strong>packet</strong> from passing through the <strong>inspection</strong> point.</p>



<figure class="wp-block-image size-large"><img width="700" height="305" src="https://blog.truevpns.com/wp-content/uploads/2020/05/700px-SSL_Deep_Inspection_Explanation.svg_.png" alt="" class="wp-image-415" srcset="https://blog.truevpns.com/wp-content/uploads/2020/05/700px-SSL_Deep_Inspection_Explanation.svg_.png 700w, https://blog.truevpns.com/wp-content/uploads/2020/05/700px-SSL_Deep_Inspection_Explanation.svg_-300x131.png 300w, https://blog.truevpns.com/wp-content/uploads/2020/05/700px-SSL_Deep_Inspection_Explanation.svg_-450x196.png 450w" sizes="(max-width: 700px) 100vw, 700px" /></figure>



<p>Deep packet inspection can examine the content of messages and identify the specific application or service it comes from. In addition, filters can be programmed to look for and reroute network traffic from a specific Internet Protocol (IP) address range or a certain online service like Facebook.</p>



<p>So by looking to the image above, We can see that DPI acts like <a aria-label="MITM Attacks (opens in a new tab)" href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" target="_blank" rel="noreferrer noopener nofollow" class="aioseop-link">MITM Attacks</a>, So the encrypted user&#8217;s traffic has to be decrypted to read its data then re-encrypt it again and re-send the encrypted data to the CA. So we <strong>MUST</strong> consider that this is a huge issue of user&#8217;s privacy.</p>



<h2>HOW TRUEVPN SOLVED THE ISSUE?</h2>



<p>Ok, At TrueVPN we believe deeply in security and user privacy, Every user has rights to privacy, because we believe that privacy is a human right and it should be respected.</p>



<blockquote class="wp-block-quote"><p>All human beings have three lives: public, private, and secret.</p><cite><strong>Gabriel García Márquez</strong></cite></blockquote>



<p>For a long while, TrueVPN was trying to solve this issue and bypassing DPI without redirecting user&#8217;s traffic or missing with CA. If you do not know what is that means, So you must have a little knowledge of Networking.</p>



<h3>TRUEVPN RESEARCH</h3>



<p>Based on our Research, We&#8217;ve developed an AI tool to analyze the ISP&#8217;s connection policies before establishing the connection, by performing that, we can check if the ISP blocks the used VPN protocol by the user or recently performed Deep Packet Inspection or Bandwidth Throttling based on analytics data. This tool is powered by <a aria-label="Skytells&#039;s latest AI (opens in a new tab)" href="https://blog.skytells.org" target="_blank" rel="noreferrer noopener" class="aioseop-link">Skytells&#8217;s latest AI</a>, and its powerful enough to analyze these policies. </p>



<p>Of course these tools are deployed on <a href="https://www.truevpns.com" class="aioseop-link" target="_blank" rel="noopener">TrueVPN&#8217;s iOS App</a> for version <strong>2.5</strong> and later.</p>



<figure class="wp-block-image size-large"><img width="1024" height="386" src="https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642-1024x386.jpg" alt="" class="wp-image-416" srcset="https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642-1024x386.jpg 1024w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642-300x113.jpg 300w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642-768x289.jpg 768w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642-450x170.jpg 450w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642-780x294.jpg 780w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642.jpg 1242w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>Policy Checks feature on TrueVPN</figcaption></figure>



<h3>HOW IT WORKS?</h3>



<p>When you <a aria-label="Enable Policy Checks (opens in a new tab)" href="https://help.truevpns.com/kb/what-is-policy-checks/" target="_blank" rel="noreferrer noopener" class="aioseop-link">Enable Policy Checks</a> on TrueVPN, The app will perform some checks before establishing the VPN connection, And try to solve any detected issues regarding the ISP or the living country if possible.</p>



<p>Lets give it an example, Imagine of a user named Doe, lives in country X, while country X is performing a Deep Packet Inspection targeting VPN providers to crack em down, So, When the users opens the VPN app and taps connect, Here&#8217;s what&#8217;s going to happen in the background</p>



<ol><li>User Taps or Clicks (Connect to a VPN)</li><li>The VPN app will choose the VPN protocol if it not set by user.</li><li>The App chooses iKEv2 or IPSec</li><li>The app begins to connect using IKEv2 or IPSec</li><li>The App receives connection timeout message</li></ol>



<p>And here&#8217;s why, When the App tries to choose the protocol on the 2nd step, it doesn&#8217;t check if the protocol has an issue regarding <a href="https://blog.truevpns.com/what-is-vpn-blocking-and-how-to-bypass-it/" class="aioseop-link">VPN Blocking</a> in the current location or not, so it may ends up with connection timeout if it fails to connect.</p>



<p><strong>But</strong>, by using an analytics tools based on research such as <a href="https://help.truevpns.com/kb/what-is-policy-checks/" class="aioseop-link" target="_blank" rel="noopener">Policy Checks Mechanisms </a>TrueVPN will perform the following steps regarding the connection.</p>



<ol><li>User Taps or Clicks on (Connect to a VPN)</li><li>TrueVPN performs some checks on user&#8217;s connection</li><li>If there&#8217;s an issue regarding the connection (See Image), The app tries to solve it first.</li><li>After solving the issue, The app will choose an obfuscated protocol</li><li> The app begins to connect using obfuscated protocol powered with proxy tunnel</li><li>The App receives success response from server.</li></ol>



<figure class="wp-block-image size-large"><img width="806" height="1024" src="https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-806x1024.jpg" alt="" class="wp-image-417" srcset="https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-806x1024.jpg 806w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-236x300.jpg 236w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-768x975.jpg 768w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-1210x1536.jpg 1210w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-450x571.jpg 450w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-780x990.jpg 780w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644.jpg 1242w" sizes="(max-width: 806px) 100vw, 806px" /><figcaption>Bypassing Deep Packet Inspection</figcaption></figure>



<p>So by performing that, TrueVPN will only use a custom obfuscated protocols when needed, and these protocols are empowered by proxy tunnel to prevent DPI detection, And finally the app can bypass the VPN Blocking.</p>


		<aside class="rb-related is-dark-style is-light-text">
			<h6 class="rb-related-header h3">You May Also Like</h6>
			<div class="rb-related-content rb-row rb-n15-gutter">
									<div class="rb-col-t6 rb-col-m12 rb-p15-gutter">
						<div class="rb-related-el">
															<div class="p-feat">
									<span class="rb-iwrap pc-75"><img width="280" height="210" src="https://blog.truevpns.com/wp-content/uploads/2022/04/truedome-1-280x210.png" class="attachment-pixwell_280x210 size-pixwell_280x210 wp-post-image" alt="TrueDome by TrueVPN" /></span>
								</div>
							<h6 class="related-title">TrueDome Annual Report: Unmatched Cybersecurity in Action.</h6>							<a class="related-link" href="https://blog.truevpns.com/truedome-annual-report-unmatched-cybersecurity-in-action/" title="TrueDome Annual Report: Unmatched Cybersecurity in Action."></a>
						</div>
					</div>
									<div class="rb-col-t6 rb-col-m12 rb-p15-gutter">
						<div class="rb-related-el">
															<div class="p-feat">
									<span class="rb-iwrap pc-75"><img width="280" height="210" src="https://blog.truevpns.com/wp-content/uploads/2022/04/Ram-only-280x210.png" class="attachment-pixwell_280x210 size-pixwell_280x210 wp-post-image" alt="" loading="lazy" /></span>
								</div>
							<h6 class="related-title">TrueVPN upgrades its infrastructure to 100% RAM-only servers</h6>							<a class="related-link" href="https://blog.truevpns.com/truevpn-upgrades-its-servers-to-ram-only-servers/" title="TrueVPN upgrades its infrastructure to 100% RAM-only servers"></a>
						</div>
					</div>
							</div>
		</aside>
		



<h2>POLICY CHECKS FAQs</h2>



<p>Here are some answers related to this feature.</p>



<p><strong>Is Policy Checks Feature Free?</strong><br>Yes, This feature is free.</p>



<p><strong>Should in use TrueVPN with Policy Checks?</strong><br>If you&#8217;re living in a country cracks down VPN connectivity or recently performed DPI, You must enable this feature. </p>



<p><strong>Will This Decrease or Increase Connection Speed?</strong><br>Of course no, This feature are just a mechanisms, designed to perform some analytics on ISP and connection <strong>before</strong> you connect to a VPN.</p>



<h2>Conclusion</h2>



<p>If you live in one of the countries who have issues with VPN Providers and tries to crack them down by blocking VPN protocols or performing DPI, Then TrueVPN is your best choice, because the app can bypass that easily.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
