Skip to main content Skip to footer
  • The Problem
    • The Root Causes of Internet Insecurity
    • The Problems with VPNs
    • How Faction Fixes Them
  • What Faction Does
    • Secure Networking
      • Networks Are Invisible and Secure by Default
      • AES 256 End-to-End Encryption
      • Zero Trust Out-of-band Authentication
      • Zero Knowledge, Zero Logs
      • Privacy Policy and Auditing
    • Secure ALL Your Devices
    • Secure Data
    • Use Cases
    • Focus Verticals
      • Manufacturing
      • Healthcare
      • Green Energy
  • Products
    • Virtual Private Circuits
    • Personal Private Networks
    • Data Security Suite
    • Faction Pods
    • Pricing
  • Resources
    • KEV Search Tool
    • Blog
    • FAQ
  • Partners
    • Our Partners
    • Pilot Program
    • MSP Center
  • About
    • Our Story
    • Our Team
    • Company News
    • Events
    • Careers
    • Privacy Policy and Principles
    • Our Values
  • The Problem
    • The Root Causes of Internet Insecurity
    • The Problems with VPNs
    • How Faction Fixes Them
  • What Faction Does
    • Secure Networking
      • Networks Are Invisible and Secure by Default
      • AES 256 End-to-End Encryption
      • Zero Trust Out-of-band Authentication
      • Zero Knowledge, Zero Logs
      • Privacy Policy and Auditing
    • Secure ALL Your Devices
    • Secure Data
    • Use Cases
    • Focus Verticals
      • Manufacturing
      • Healthcare
      • Green Energy
  • Products
    • Virtual Private Circuits
    • Personal Private Networks
    • Data Security Suite
    • Faction Pods
    • Pricing
  • Resources
    • KEV Search Tool
    • Blog
    • FAQ
  • Partners
    • Our Partners
    • Pilot Program
    • MSP Center
  • About
    • Our Story
    • Our Team
    • Company News
    • Events
    • Careers
    • Privacy Policy and Principles
    • Our Values
Faction Networks logo
  • The Problem
    • The Root Causes of Internet Insecurity
    • The Problems with VPNs
    • How Faction Fixes Them
  • What Faction Does
    • Secure Networking
      • Networks Are Invisible and Secure by Default
      • AES 256 End-to-End Encryption
      • Zero Trust Out-of-band Authentication
      • Zero Knowledge, Zero Logs
      • Privacy Policy and Auditing
    • Secure ALL Your Devices
    • Secure Data
    • Use Cases
    • Focus Verticals
      • Manufacturing
      • Healthcare
      • Green Energy
  • Products
    • Virtual Private Circuits
    • Personal Private Networks
    • Data Security Suite
    • Faction Pods
    • Pricing
  • Resources
    • KEV Search Tool
    • Blog
    • FAQ
  • Partners
    • Our Partners
    • Pilot Program
    • MSP Center
  • About
    • Our Story
    • Our Team
    • Company News
    • Events
    • Careers
    • Privacy Policy and Principles
    • Our Values
  • The Problem
    • The Root Causes of Internet Insecurity
    • The Problems with VPNs
    • How Faction Fixes Them
  • What Faction Does
    • Secure Networking
      • Networks Are Invisible and Secure by Default
      • AES 256 End-to-End Encryption
      • Zero Trust Out-of-band Authentication
      • Zero Knowledge, Zero Logs
      • Privacy Policy and Auditing
    • Secure ALL Your Devices
    • Secure Data
    • Use Cases
    • Focus Verticals
      • Manufacturing
      • Healthcare
      • Green Energy
  • Products
    • Virtual Private Circuits
    • Personal Private Networks
    • Data Security Suite
    • Faction Pods
    • Pricing
  • Resources
    • KEV Search Tool
    • Blog
    • FAQ
  • Partners
    • Our Partners
    • Pilot Program
    • MSP Center
  • About
    • Our Story
    • Our Team
    • Company News
    • Events
    • Careers
    • Privacy Policy and Principles
    • Our Values
Invest NowGet Early Access

How can we help you?

Getting Started

  • Getting Started with Your Pilot
  • How to Use TestFlight
  • Introduction to Faction Virtual Private Circuits

Documentation

  • Creating Virtual Private Circuits with Faction Networks

Knowledge Base

  • Faction Networks Explained (for Geeks)
  • How Faction Pods Protect All Your Devices
  • Faction Pods Explained (for Geeks)

The Problem

  • What We Are Doing is NOT Working
  • The Problems with VPNs
  • Faction Puts You In Control
  • Do You Know Your Attack Surface on the Web?
  • Faction Personal Private Networks (PPNs)

What Faction Does

  • Hassle Free, Zero Config, Secure and Private Networks Controlled only by YOU
  • Secure Access to ALL Your Devices
  • Data Security & Privacy
  • Use Cases
  • Focus Verticals
  • Secure Networking
    • Privacy Policy & Auditing
    • Zero Knowledge, Zero Logs
    • Zero Trust Out-of-Band Authentication
    • AES 256 Encryption – and Only YOU Control the Keys
    • Fully Decentralized Mesh Network Created by You
    • Faction Networks Are Invisible and Connections Secure by Default
  • Focus Verticals
    • Manufacturing
    • Healthcare
    • Green Energy

Products

  • A Plan For Everyone
  • Faction Virtual Private Circuits (VPC)
  • Faction Personal Private Networks (PPNs)
  • Faction Also Protects Data
  • Faction Pods
  • Home
  • Docs
  • The Problem
  • What We Are Doing is NOT Working
View Categories

What We Are Doing is NOT Working

3 min read

Hundreds of billions of dollars are spent annually for layer upon layer of active defenses, yet not a day goes by without new headlines and personal experiences of successful attacks that continue to multiply.

We need the Internet. But the Internet and telecommunications networks are insecure and NOT PRIVATE. #

  • No device, data or digital asset of value is safe from criminals and hackers
  • Authoritarian governments and hostile state actors around the world can spy upon and sabotage companies and organizations, infrastructure and individuals with unprecedented ease and efficiency
  • Defending against this threat matrix has become too complex and costly for average users and SMBs, so they just give up

How Did We Get Here? #

This didn’t just happen by accident. There are root causes for the current state of affairs.

Centralized servers, with human access and control #

The “Cloud” infrastructure that you rely on today – and the security solutions that attempt to defend it – all rely upon:

  • Centralized servers
  • Centralized Certificate Authorities

These servers, certificates and people can all be compromised. Or no need to bother since certificates can be purchased on the Dark Web!

Visible for study and attack #

With Internet Protocol, network addresses and traffic are visible, and connections are insecure by default. So the Bad Guys always have the advantage.

Data is Vulnerable #

Because:

  • it is either not encrypted or someone else has the access to and control of the keys; and
  • encryption UX is too complex and painful so it is rarely used

The Costs of Insecurity Are High and Growing #

  • Remote distributed workforce with BYODHas made traditional defences like VPNs irrelevant
  • Everything is Getting ConnectedIt is no longer just your data at risk
  • Al is expanding both the sophistication and breadth of attacksExponentially lowering the costs and increasing the power of decentralized attacks

Most Average User and SMBs are Basically Defenseless #

Because they lack an understanding of the threat and existing tools are too complex and expensive

VPNs Are Simply Not Sufficient #

It’s not that they are bad. They just do not address the actual root causes of the problem and suffer from the same 3 foundational vulnerabilities.

  • Centralized servers with human access
  • Castle and Moat architecture 
  • Visible for study and attack

And they still integrate and rely upon the rest of Web infrastructure – and its vulnerabilities.

SDNs / ZTNA Are Too Complex and Expensive – and Still Vulnerable #

Still Have Centralized Control and VulnerabilitiesComplex and Hard for End Users and ITExpensive Enterprise Solutions & Support

So SMBs avoid them entirely or use them only for selective, high risk users – leaving the rest of their networking unprotected or on VPNs.

Neither Protect Our Critical Smart and Dumb Devices #

Because they lack:

  • sufficient resources for encryption; and/or
  • programmable interfaces to connect to encrypted networks.

So organizations rely upon firewalls and other tools to try to block the gateways to them.  But so long as they are on the Internet, they are vulnerable.

Neither Protect Your Data #

  • VPNs and SDNs / ZTNA only protect data in transit.
  • Centralized admininistration and access
  • Don’t scale, rigid and brittle
  • Complex and Hard for End Users and IT

So your data just lies around on endpoint devices and cloud servers waiting for the next hack.

“Just Trust Us” #

Today, you always have to trust the Privacy Policies and ability of Web platforms, application providers – including VPN companies, service providers and your own staff – to defend their platforms and infrastructure from outside and inside attacks. But they can always be compromised easily.

Updated on February 4, 2024
The Problems with VPNs
Table of Contents
  • We need the Internet. But the Internet and telecommunications networks are insecure and NOT PRIVATE.
  • How Did We Get Here?
    • Centralized servers, with human access and control
    • Visible for study and attack
    • Data is Vulnerable
  • The Costs of Insecurity Are High and Growing
  • Most Average User and SMBs are Basically Defenseless
    • VPNs Are Simply Not Sufficient
    • SDNs / ZTNA Are Too Complex and Expensive - and Still Vulnerable
    • Neither Protect Our Critical Smart and Dumb Devices
    • Neither Protect Your Data
    • "Just Trust Us"
Faction Logo
    • The Problem
    • What Faction Does
    • Products
    • About
    • Partners
    • Join our Pilots

Copyright © 2023 - • Faction Networks

  • Terms and Conditions
  • Disclaimer
Privacy Policy

Join our security Newsletter

Manage Cookie Consent

To provide the best experiences, we use technologies like cookies to store and/or access device information. Targeting cookies are not included. We use Burst Statistics to track activity on the site but do not share this data with any 3rd parties. 

 

Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions such as cookie preferences and payment processes.

Necessary Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Cookie Consent

To provide the best experiences, we use technologies like cookies to store and/or access device information. Targeting cookies are not included. We use Burst Statistics to track activity on the site but do not share this data with any 3rd parties.

Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions such as cookie preferences and payment processes.

Necessary Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}