When I was first toying with the idea of privacy and security online I messed around with a few VPN providers. As someone that was into the "netsec" scene I understood HTTPS and OpenSSL certificate management and obviously I had a pretty strong grasp of networking. My goal was to find something that wasn't a huge performance penalty, was secure, and did not log my activities.
I was greeted with speeds ranging from terrible to lackluster. A number of providers did not even offer OpenVPN, and a huge number of providers offered (and still offer) the known broken PPTP VPN protocol. I witnessed a number of VPN providers with websites that had unencrypted web forms. In the few months that I was trialing various VPN providers, I also experienced frequent disconnects and outages. I also hated VPN providers with multiple locations that were congested, and I had to hunt around for a server that gave me a reliable connection that wasn't slow and didn't give me a 900ms ping.> read more
Here is the gist of what I have been working on at VikingVPN:
Android and iOS guides - This has been much slower going than the Windows and Linux guides because of the lack of reliable screen recording software. I'm trying to get a camera-based setup working but it is similarly difficult to get a clear shot of what is going on without issues with lighting or focus getting in the way of making something worth looking at. So they are coming, but they might be a while.
Building your own router guide - This is one I've wanted to do for a long while and I'm trying to find the best OS + Hardware combination for people to use that will give you the combination of power and ease of use that our readers would desire. Right now the candidates are pfSense, Vyatta, and DD-WRT for x86.
Users have reported and we have confirmed a problem with the latest version of the Viscosity client on our service. It is appears to be a problem with the handshake while connecting to our service with the latest version. We are currently investigating the issue.
The problem is isolated to the newest version of the Viscosity client, and it spans both Windows and OSX.
For now, we recommend using the default OpenVPN client in Windows (we actually recommend it anyway in Windows) and the TunnelBlick open-source client for OSX.
We have contacted SparkLabs to try to identify the problem for a possible patch on their end.> read more
Some of the Chicago servers are being taken down for updates. You may be disconnected from the service during this maintenance if you are signed in to an affected server. If you are disconnected, you should be able to immediately reconnect to unaffected servers in the cluster.
Also, for the next 12 minutes, you will not be able to generate new configuration files.
Edit: All Chicago services have been fully restored. The ability to generate new config files has also been restored.> read more
We have completed our Ubuntu 13.10 (Saucy Salamander) installation guide for YouTube.
You can view it here: https://www.youtube.com/watch?v=6l4AknUTTCk
This guide is actually substantially simpler than our previous guide, because 13.10 has OpenVPN 2.3.2 built-in which has full support for inline keys. This removes multiple steps from the old install process.
More guides are coming! Next up is Windows 8. Then Android and iOS.> read more
A new vulnerability has been discovered in Google's Android operating system that allows a malicious app to bypass some VPN services. Our OpenVPN service is not impacted by this new vulnerability because our data is encrypted at the application layer, before any other app would get a chance to pull the data to route somewhere else.
This vulnerability will affect PPTP and L2TP VPNs that are using the built-in VPN functionality in Android. VikingVPN, being a security-conscious VPN provider, has never supported these types of VPNs due to their inherent security issues with encryption and man-in-the-middle attacks.> read more
Users have reported problems with the Chicago cluster related to connectivity. We are currently investigating the issue. Depending on the action taken, you may get dropped from the service momentarily while we work on the cluster.
I will report back when the investigation is complete.
Edit: Investigation complete, and the problem should be fixed for all users.> read more
We have completed our rollout of new server clusters in Phoenix, AZ and Amsterdam, NL.
To access the new server clusters, you will need to log into the site and visit the Profile area.
When you generate a new certificate, you will now get 3 configuration files, one for each server cluster. These need to be placed in your config folder. Be sure to delete any of your old config files when you generate new ones, as the old certificates and keys are revoked when you create new ones.
You can then choose which VPN location you wish to connect to by selecting the server in OpenVPN GUI.
Because we use very high quality Tier-1 carriers, under normal conditions you should see the best performance from the cluster that is physically closest to your location. If either of our new sites are closer to you, you should get even better performance when connecting to them!