Securing a cellphone account

  • SpinRite v6.1 Release #3
    Guest:
    The 3rd release of SpinRite v6.1 is published and may be obtained by all SpinRite v6.0 owners at the SpinRite v6.1 Pre-Release page. (SpinRite will shortly be officially updated to v6.1 so this page will be renamed.) The primary new feature, and the reason for this release, was the discovery of memory problems in some systems that were affecting SpinRite's operation. So SpinRite now incorporates a built-in test of the system's memory. For the full story, please see this page in the "Pre-Release Announcements & Feedback" forum.
    /Steve.
  • Be sure to checkout “Tips & Tricks”
    Dear Guest Visitor → Once you register and log-in please checkout the “Tips & Tricks” page for some very handy tips!

    /Steve.
  • BootAble – FreeDOS boot testing freeware

    To obtain direct, low-level access to a system's mass storage drives, SpinRite runs under a GRC-customized version of FreeDOS which has been modified to add compatibility with all file systems. In order to run SpinRite it must first be possible to boot FreeDOS.

    GRC's “BootAble” freeware allows anyone to easily create BIOS-bootable media in order to workout and confirm the details of getting a machine to boot FreeDOS through a BIOS. Once the means of doing that has been determined, the media created by SpinRite can be booted and run in the same way.

    The participants here, who have taken the time to share their knowledge and experience, their successes and some frustrations with booting their computers into FreeDOS, have created a valuable knowledgebase which will benefit everyone who follows.

    You may click on the image to the right to obtain your own copy of BootAble. Then use the knowledge and experience documented here to boot your computer(s) into FreeDOS. And please do not hesitate to ask questions – nowhere else can better answers be found.

    (You may permanently close this reminder with the 'X' in the upper right.)

I've run a VPN on my cell phone for a while now, periodically letting it reconnect to a different country- why not? I got to wondering since the cell connection is used for much of the actual data transfer, is the VPN really doing much good. I had the idea to turn off the cell connection and force things through wifi where it will be forced through the VPN. Would this be more secure than leaving cell data active? Of cause doing that requires having a wifi connection, but my cell phone rarely leaves the house. Also, I wouldn't leave the cell data permanently disabled, although I probably could. Any ideas about wifi with VPN vs cell data security?
 
VPN means the cell carrier has no idea, other than the amount of data, and where it is going and coming from, to use. Thus they cannot use DNS spoofing or redirection to point you to adverts or landing pages they control, and thus no way to get more money from you other than the money you pay for the big dumb pipe of data. Does at least get rid of that, and you can just use a VPN inside the country you live in, as that will be the fastest, and also will not allow the cell carrier to throttle on a per application basis, like a lot of them do. It turns the link from your phone, to them, into a long dumb ethernet cable, stripping most of the redirection and caching away that is so common on cellular connections.
 
Thanks for that info. I was under the (wrong) impression the cell phone VPN would protect the wifi portion but not cellular data.
 
You can test this yourself to confirm that it is working correctly.
I use Network Analyzer, but I'm sure there are other apps that do the same thing.

The "Info" page shows your ip address, dns server, gateway, external ip address and more. With your cellphone only connected to cellular data reload the "External IP" line, note the address. Then start your VPN. Go back to Network Analyzer and reload the "External Ip" line. The address should change to the VPN address.
 
Or - with your VPN App running - connect to ShieldsUp and trigger an open-ports test - once with and once without your WiFi enabled, and note the IP address each time of the VPN 'exit' server that's being tested by each of the ShieldsUp sessions.

I'll predict from my own recent tests that ShieldsUp will 'see' the exact same VPN server IP address each time, whether your phone is using cell data only, or WiFi.

Note that your VPN App will likely auto-close each time you change your phone's network settings, so, for consistency simply choose the same VPN exit server (the same 'Country') when you relaunch your VPN App for the second part of this test.

(Also I'll assume your VPN service won't have switched between its possibly multiple exit servers when you run your second test!)

You might also be interested in the small sub-set of open ports that ShieldsUp reveals on (any of) your VPN's 'exit' servers ... but that would be a whole other discussion.
 
Another good test, thanks. I didn't think of ShieldsUp. I do have a profile on the VPN that has a fixed exit server. One or two sites kept saying I was using an unrecognized device (on my laptop) almost every login and annoying me with email verifications and captchas (sp). I know from a security view it's good they do that, but not to me. With rare exception I let the VPN pick random exits. I'll give ShieldsUp a try later and see what it says. Thanks again.
 
A VPN can certainly be used with cellular data. My phone supplier, by default, routes traffic via a DNS server which blocks various types of sites, e.g. adult sites, despite me being registered as over 18.

Installing a VPN on the phone lets me use a different DNS and get to any site that I want via cellular data.
 
Looks like my VPN (Proton) does what it is supposed to on my phone. Especially now days it's a good idea to check things, especially security wise, rather than assuming all is OK.