NordVPN Promotion

Home / Blogs

April 8 2014: A World Less Secure

Protect your privacy:  Get NordVPN  [ Deal: 73% off 2-year plans + 3 extra months ]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

Not long after the message that Microsoft will stop updating Windows XP from 8 April onwards, after extending it beyond the regular life cycle for over a year already, came the soothing message that malware will be monitored for another year. That may be good news to some, but the fact remains that this is not the same as patching.

Remaining on XP leads to a vulnerable state of the desktop, lap top and any other machine running on XP; vulnerable to potential hacks, cyber crimes, becoming part of a botnet, etc. Next to that your machine becomes a part of an army aimed to hurt others. Transition to a newer operating system is important but who should lead here?

As I expect you to aware of the necessity of patching/updating software and running AV security, etc. I prefer not to go into detail here. For those that would like to read the longer version, you can visit my blog.

Windows XP as liability

The relevance of Microsoft stopping the support of Windows XP is that every vulnerability discovered after 8 April will no longer be patched and remain a vulnerability for ever. Part of the problem is that people or organisations running XP won’t notice any difference. The program keeps doing everything it did before. The main problem is from a security angle. An estimated 20 to 29% of all desk tops in the world still run on this operating system. Everyone running XP becomes exposed. End users become vulnerable to hacks, botnets, the stealing of personal identity, phishing, etc. Apparently there are more people working with XP in developing countries, so the risks become greater there. But what about institutions, government agencies and companies?

The danger is the same for everyone involved. The risk and danger to inflict serious harm only becomes greater if e.g. a hospital, water protection or major infrastructural institutions like oil refineries or road systems become easier targets for hackers or cyber terrorists. Next to that reputational damages will be higher also. So this makes Windows XP or more precisely working with Windows XP a liability, personally and collectively.

The role of government

At the latest IGF in Bali, Indonesia, Internet Engineering Task Force (IETF) representatives discussed their work, role, but also the (lack of) implementation of technical standards. If governments think it is important to implement a new standard, their message was, it is they that should ask for this implementation when buying a new product. As governments are big customers, this demand will lead to general implementation. Governments unfortunately do not often ask for best practices or new standards. Cheapest price is often more important or so I’m told.

Microsoft has announced the termination of support of XP several years ago. Still, it is said that several large institutions have not yet migrated to a newer version. Some may even still run Windows 98 or 95. It is at moments like this that a government (and yes, the question “who is the government?” is a valid one here) could lead. A good example is the Dutch National Cyber Security Centre that published a fact sheet (click here) in October 2013, warning the general public for the termination of XP’s update service. This is not the same as establishing a program that aids the whole government to migrate in time. It is not just the central government that is in the line of fire from 8 April onwards, no, we have to think of smaller and specialised agencies and institutions, local government agencies, etc., who’s systems may be part of the vital infrastructure of a country. A country cannot afford to become vulnerable this way, but it will probably happen anyway.

And outside government?

A government can never be responsible for the actions of non-governmental actors, but could lead in the way forward. Starting with itself and by starting serious awareness campaigns. Or by setting harsher rules concerning the use of internet? Like with cars and airplanes? Or is this just one step beyond?

Next to that there are machines that run XP (or older) that cannot be replaced or will not be until the end of their respective life cycles. What is the solution here? There isn’t one, except looking at the option if it is essential that this machine connects to the internet. Any other suggestions?

Also it is important that an end is brought to the exclusiveness of the outside coming in kind of protection. It is the inside going out that needs more attention. Every vulnerability is abused to attack others as well. Protecting yourself as best as possible is also protecting your environment. So is developing and selling secure by design ICT products. As long as the inside out awareness is not there or is not seen as important, better, a standard, we might as well start allowing anyone to drive or fly without practice, tests and examinations. Securing the internet has to become a common task, not something without obligation, without needing to commit to. It is time this awareness sets in. Starting at government level.

Failure should not be an option

In short. From 8 April 2014 onwards the online world will notably be less safe and one thing is changing fast: We are staring the internet of everything in the face. No one can force an end user to migrate from his old hobby horse, that probably cannot even work on a modern operating system, to something else. This is different for institutions. Money ought not to be a reason not to migrate here. Primary processes, privacy sensitive data, critical infrastructure, even the lives of people may be involved. Reputations are at stake and judicial claims may even be brought to court should something seriously go wrong. Isn’t not migrating gross neglect or worse? If not, perhaps it should become thus.

A duty to care starts with being as safe as possible. A duty to care ruling may be a solution that aids institutions to make timely decisions. It could make people, from you and me all up to the executive, aware that being on the internet comes with a responsibility to others on the internet, just like participation in traffic does. This is true for end users, but certainly for government institutions and organisations. It is they that have to lead and set examples. Failing after 8 April to migrate should not have any excuses. Is there a duty to care ruling? No, but who could provide this? Right, the government and not just for XP migration.

By Wout de Natris, Consultant internet governance

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

NordVPN Promotion