Once I installed EtherApe on my Debian Thinkpad I began noticing some internet providers allowed the vpngate tunnel to be breached. (see image1) zq1.de from Germany I suppose and before that Voxitity.net (in Romania? had) it's own HTTPS patching past the VPN and that happened at the last provider, too... I jumped to another place.
Going back a month ago I turned off the IVP6 because my downloads were showing up going trought the vpngate tunnel and then jumped to another part of EtherApe to show the download continuing between two IPV6 addresses, which really looked like a bad breach.
For example, My tunnel came through vpngate's 18.104.22.168 to T500b.local while you can see Torix.ca was breaching before the download started... , but once the download started then ...ipv6.telus.net began taking all the traffic on this EtherApe monitoring software. Here is the image after I started a download
I used the linux command to stop ipv6 on the old laptop so only ipv4 worked and the "breach?" stopped and data flowed only through the vpngate tunnel.
Thanks for your input,
Post your questions about VPN Gate Academic Experiment Service here. Please answer questions if you can afford.
1 post • Page 1 of 1