Page 100 - Cyber Warnings August 2017
P. 100
2. IKEv2: Internet Key Exchange version 2 (IKEv2) is the most advanced and fastest protocol
available. It’s the newest one yet and gets a 10/10 as the protocol is extremely easy to setup
and very stable. However, it doesn’t work on old platforms and is most efficient when
implemented over IPsec.
3. PPTP: Short for Point-to-Point Tunneling Protocol, PPTP offers a basic 128-bit encryption. When
it comes to specialization, there’s always an opportunity cost, and in PPTP’s case, it’s security.
But for what it lacks in security, it more than makes up for in speed. Furthermore, setting up this
protocol requires very minimal technical knowhow.
4. L2TP: L2TP, short for Layer 2 Tunnel Protocol, is the complete opposite of PPTP. Think of this
protocol as an extremely muscular bodyguard. It’s lean and big but slower compared to other
protocols. However, it’s very simple to set up and works on all platforms.
5. SSTP: SSTP, short for Secure Socket Tunneling Protocol, is created and owned by Microsoft. This
means that it only works on Windows operating systems and backdoor auditing is out of the
question. It’s renowned for its high level of security and ability to bypass strong firewalls. Also, it
uses SSLv3 just like OpenVPN.
So, don’t want ISPs and third-parties to get their greedy hands on your private data? Then, you
should consider using a VPN to secure and anonymize all your internet traffic and keep it out of
the reach of surveillance.
About The Author
Osama Khan is a cyber-security expert who has mastered the art of internet security & privacy.
Find himself in becoming a sensei in the field of cybersecurity and how to safeguard your online
privacy.
PureVPN offers five different types of VPN protocols. Learn more at:
https://www.purevpn.com/vpn-protocols
100 Cyber Warnings E-Magazine – August 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide.