Skip to main content Skip to footer
  • The Problem
    • The Root Causes of Internet Insecurity
    • The Problems with VPNs
    • How Faction Fixes Them
  • What Faction Does
    • Secure Networking
      • Networks Are Invisible and Secure by Default
      • AES 256 End-to-End Encryption
      • Zero Trust Out-of-band Authentication
      • Zero Knowledge, Zero Logs
      • Privacy Policy and Auditing
    • Secure ALL Your Devices
    • Secure Data
    • Use Cases
    • Focus Verticals
      • Manufacturing
      • Healthcare
      • Green Energy
  • Products
    • Virtual Private Circuits
    • Personal Private Networks
    • Data Security Suite
    • Faction Pods
    • Pricing
  • Resources
    • KEV Search Tool
    • Blog
    • FAQ
  • Partners
    • Our Partners
    • Pilot Program
    • MSP Center
  • About
    • Our Story
    • Our Team
    • Company News
    • Events
    • Careers
    • Privacy Policy and Principles
    • Our Values
  • The Problem
    • The Root Causes of Internet Insecurity
    • The Problems with VPNs
    • How Faction Fixes Them
  • What Faction Does
    • Secure Networking
      • Networks Are Invisible and Secure by Default
      • AES 256 End-to-End Encryption
      • Zero Trust Out-of-band Authentication
      • Zero Knowledge, Zero Logs
      • Privacy Policy and Auditing
    • Secure ALL Your Devices
    • Secure Data
    • Use Cases
    • Focus Verticals
      • Manufacturing
      • Healthcare
      • Green Energy
  • Products
    • Virtual Private Circuits
    • Personal Private Networks
    • Data Security Suite
    • Faction Pods
    • Pricing
  • Resources
    • KEV Search Tool
    • Blog
    • FAQ
  • Partners
    • Our Partners
    • Pilot Program
    • MSP Center
  • About
    • Our Story
    • Our Team
    • Company News
    • Events
    • Careers
    • Privacy Policy and Principles
    • Our Values
Faction Networks logo
  • The Problem
    • The Root Causes of Internet Insecurity
    • The Problems with VPNs
    • How Faction Fixes Them
  • What Faction Does
    • Secure Networking
      • Networks Are Invisible and Secure by Default
      • AES 256 End-to-End Encryption
      • Zero Trust Out-of-band Authentication
      • Zero Knowledge, Zero Logs
      • Privacy Policy and Auditing
    • Secure ALL Your Devices
    • Secure Data
    • Use Cases
    • Focus Verticals
      • Manufacturing
      • Healthcare
      • Green Energy
  • Products
    • Virtual Private Circuits
    • Personal Private Networks
    • Data Security Suite
    • Faction Pods
    • Pricing
  • Resources
    • KEV Search Tool
    • Blog
    • FAQ
  • Partners
    • Our Partners
    • Pilot Program
    • MSP Center
  • About
    • Our Story
    • Our Team
    • Company News
    • Events
    • Careers
    • Privacy Policy and Principles
    • Our Values
  • The Problem
    • The Root Causes of Internet Insecurity
    • The Problems with VPNs
    • How Faction Fixes Them
  • What Faction Does
    • Secure Networking
      • Networks Are Invisible and Secure by Default
      • AES 256 End-to-End Encryption
      • Zero Trust Out-of-band Authentication
      • Zero Knowledge, Zero Logs
      • Privacy Policy and Auditing
    • Secure ALL Your Devices
    • Secure Data
    • Use Cases
    • Focus Verticals
      • Manufacturing
      • Healthcare
      • Green Energy
  • Products
    • Virtual Private Circuits
    • Personal Private Networks
    • Data Security Suite
    • Faction Pods
    • Pricing
  • Resources
    • KEV Search Tool
    • Blog
    • FAQ
  • Partners
    • Our Partners
    • Pilot Program
    • MSP Center
  • About
    • Our Story
    • Our Team
    • Company News
    • Events
    • Careers
    • Privacy Policy and Principles
    • Our Values
Invest NowGet Early Access

How can we help you?

Getting Started

  • Getting Started with Your Pilot
  • How to Use TestFlight
  • Introduction to Faction Virtual Private Circuits

Documentation

  • Creating Virtual Private Circuits with Faction Networks

Knowledge Base

  • Faction Networks Explained (for Geeks)
  • How Faction Pods Protect All Your Devices
  • Faction Pods Explained (for Geeks)

The Problem

  • What We Are Doing is NOT Working
  • The Problems with VPNs
  • Faction Puts You In Control
  • Do You Know Your Attack Surface on the Web?
  • Faction Personal Private Networks (PPNs)

What Faction Does

  • Hassle Free, Zero Config, Secure and Private Networks Controlled only by YOU
  • Secure Access to ALL Your Devices
  • Data Security & Privacy
  • Use Cases
  • Focus Verticals
  • Secure Networking
    • Privacy Policy & Auditing
    • Zero Knowledge, Zero Logs
    • Zero Trust Out-of-Band Authentication
    • AES 256 Encryption – and Only YOU Control the Keys
    • Fully Decentralized Mesh Network Created by You
    • Faction Networks Are Invisible and Connections Secure by Default
  • Focus Verticals
    • Manufacturing
    • Healthcare
    • Green Energy

Products

  • A Plan For Everyone
  • Faction Virtual Private Circuits (VPC)
  • Faction Personal Private Networks (PPNs)
  • Faction Also Protects Data
  • Faction Pods
  • Home
  • Docs
  • The Problem
  • The Problems with VPNs
View Categories

The Problems with VPNs

2 min read

It’s not that they are bad. They just do not address the actual root causes of the vulnerabilities to your privacy and security.

Over 1 billion people use VPNs to attempt to protect their Web browsing, networking and data. But what most of these people don’t know is that VPNs share the same 3 core vulnerabilities of all Web infrastructure, which make your privacy impossible to guarantee.

Why VPNs Are Not Actually Private or Secure #

While your VPN tunnel is secure, everything else is vulnerable and can be compromised.

Admins & Staff Everywhere #

Your security is only as good as the lowest paid engineer or disgruntled insider – especially at your VPN company!

Certificate Authorities #

Certificate Authorities are like banks – but far easier to compromise!

The security of all of your other connections and networking on the Web depend on SSL Certificates.   These are centralized and run by admins and staff – who can always be compromised.  Or no need to bother since Certificates are widely available for purchase on the Dark Web!

IAM & Authentication Servers #

Centralized with Cloud Vulnerabilities

These build a whole new centralized database of user identity and credentials, while still being just as vulnerable to cloud hacks of the servers, admins and staff that control them.

They also depend on user credentials – which are notoriously insecure – and 2FA – which is trivially easy to spoof.

LANs and WANs #

Breaches Are Catastrophic

Your VPN tunnel may remain encrypted, but once the weak points in a VPN are compromised, the attacker can go anywhere in the VPN and the internal local and wide area networks it connects to.

Web Apps #

Out of Scope

When you use and connect to 3rd party Web applications, then you are beyond the scope of VPNs or SDNs and must rely up on their authentication and Web server defenses to protect your connection and your data.

Web Servers #

Are Simply NOT Private at All

Everything you do on the Web is visible and tracked anyways unless you use a Privacy Browser.  And even then, there are all kinds of gotchas.


Centralized Architecture & Control #

  • Centralized Servers
  • Centralized Certificate Authorities

The servers, certificates and people can all be compromised.

Or no need to bother since certificates can be purchased on the Dark Web!

Networks & Connections are Visible and Vulnerable #

Because They Rely Upon Internet Protocol

  • With Internet Protocol, network addresses and traffic are visible, and connections are insecure by default
  • So the Bad Guys always have the advantage

Data is Vulnerable #

Because it is either not encrypted or someone else has the keys.

There is always someone other than you who has access and control.

End Users are careless and endpoint encryption a poor UX so it is rarely used.


Smart Manufacturing & Infrastructure #

Depend on Firewalls or Nothing at All.    

A combination of legacy devices and new very smart machines now populate most floors in the modern manufacturing workplace.   Old ones simply cannot be protected – but are too disruptive to replace.  New ones may be smart, but rely on precise millisecond-level calibration to which encryption is an unwelcome variable.  

Organizations used to rely upon dedicated T1 ‘Circuits’ to keep these isolated, but over the last decade those have been phased out and now most are simply connected – and exposed – to the Internet.

Network Appliances #

Depend on Firewalls.

They just rely on the protection of the gateway into the local network.  Some appliances like Network Attached Storage devices and printer / fax / scanners are ‘smart’ enough, but do not have rigorous security or programmable UIs to add encrypted networking.

Smart Home Office Devices #

Cannot Be Protected by VPNs.

These devices do not have sufficient resources or programmable interfaces to support encryption and secure connections, so they are completely exposed to Internet attacks.

Smart Home Hubs #

Evade VPNs and Firewalls.

These evade your VPN firewalls and other protections to send your data back and forth directly to their cloud servers.

The devices still can’t encrypt their data traffic, and are still on IP, so can be attacked directly through your router.

Updated on February 4, 2024
What We Are Doing is NOT WorkingFaction Puts You In Control
Table of Contents
  • Why VPNs Are Not Actually Private or Secure
    • Admins & Staff Everywhere
    • Certificate Authorities
    • IAM & Authentication Servers
    • LANs and WANs
    • Web Apps
    • Web Servers
    • Centralized Architecture & Control
    • Networks & Connections are Visible and Vulnerable
    • Data is Vulnerable
    • Smart Manufacturing & Infrastructure
    • Network Appliances
    • Smart Home Office Devices
    • Smart Home Hubs
Faction Logo
    • The Problem
    • What Faction Does
    • Products
    • About
    • Partners
    • Join our Pilots

Copyright © 2023 - • Faction Networks

  • Terms and Conditions
  • Disclaimer
Privacy Policy

Join our security Newsletter

Manage Cookie Consent

To provide the best experiences, we use technologies like cookies to store and/or access device information. Targeting cookies are not included. We use Burst Statistics to track activity on the site but do not share this data with any 3rd parties. 

 

Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions such as cookie preferences and payment processes.

Necessary Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Cookie Consent

To provide the best experiences, we use technologies like cookies to store and/or access device information. Targeting cookies are not included. We use Burst Statistics to track activity on the site but do not share this data with any 3rd parties.

Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions such as cookie preferences and payment processes.

Necessary Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}