HOME

TheInfoList



OR:

SaferVPN was a
VPN service A virtual private network (VPN) service provides a proxy server to help users bypass Internet censorship such as geoblocking and users who want to protect their communications against data profiling or MitM attacks on hostile networks. A wide va ...
developed by Safer Social, Ltd.


History

SaferVPN was released in 2013 by Amit Bareket and Sagi Gidali. SaferVPN network infrastructure served as the basis of Barekets' and Gidalis' next company,
Perimeter 81 Perimeter 81 is an Israeli cloud and network security company that develops secure remote networks, based on the zero trust architecture, for organizations. Its technology replaces legacy security appliances like VPNs and firewalls.J2 Global J2 Global, Inc. was an American technology holding company based in Los Angeles, California. The company provided Internet services through two divisions: Business Cloud Services and Digital Media. History J2 Global was founded in December 1995 ...
in 2019 Q3 and was eventually merged into
StrongVPN J2 Global, Inc. was an American technology holding company based in Los Angeles, California. The company provided Internet services through two divisions: Business Cloud Services and Digital Media. History J2 Global was founded in December 1995 ...
.


Technology

SaferVPN utilized the protocols
OpenVPN OpenVPN is a virtual private network (VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It implements both client and server appl ...
,
PPTP The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks. PPTP has many well known security issues. PPTP uses a TCP control channel and a Generic Routing Encapsulation tunnel to encapsulate PP ...
,
L2TP In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It uses encryption ('hiding') only for its own control messages (using ...
and
IKEv2 In computing, Internet Key Exchange (IKE, sometimes IKEv1 or IKEv2, depending on version) is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKE builds upon the Oakley protocol and ISAKMP.The Internet Key Exch ...
.


See also

*
Comparison of virtual private network services A virtual private network (VPN) service provides a proxy server to help users Internet censorship circumvention, bypass Internet censorship such as Geo-blocking, geoblocking and users who want to protect their communications against data profiling ...


References

{{VPN Virtual private network services