According to their website:
> § 1 No Saving of Data in the Usage of the VPN Server
>The OkayFreedom-Service saves neither the addresses nor contents that the user calls up, nor the IP addresses that OkayFreedom has allocated, nor their own IP address that they use on OkayFreedom. It is not possible for Steganos to determine what contents an OkayFreedom calls up. Neither the IP addresses of the users nor the IP addresses of the called server is saved.
I personally like to use Steganos Locknote.
If you mean paid then PIA is one of the cheaper, but the best VPNs. If you mean free then most, if not all of the ones are adbots that sell your data and are insecure. But out of those Steganos is somewhat okay. It offers 100mb free usage per month which is enough to log in to Spotify.
One ultra-simple way of keeping track of passwords is to use a free program called Steganos Locknote It is an open source encrypted version of notepad. It takes about 60 seconds to learn how to use it and when used for password storage, it allows you to have quick access to multiple passwords by only remembering one master password. The program requires no updates and uses AES encryption, so very secure. The file can be copied to a USB drive for portability.
> § 1 No Saving of Data in the Usage of the VPN Server
The OkayFreedom-Service saves neither the addresses nor contents that the user calls up, nor the IP addresses that OkayFreedom has allocated, nor their own IP address that they use on OkayFreedom. It is not possible for Steganos to determine what contents an OkayFreedom calls up. Neither the IP addresses of the users nor the IP addresses of the called server is saved.
You probably mean AES-256, and yes it's bad. If you delete a file from the harddrive by using a normal delete command or the recycle bin (and emptying it), it is not really gone, but merely the entry in the index is "crossed out". This allows somebody to restore the unencrypted copy from the drive if he knows what to look for. Overwriting the file with random stuff before deleting is no guarantee too if you have an SSD. if you want to use this method, use an application that will encrypt the file on its own. Steganos Locknote is such an example. It is particularly interesting because it modifies itself, meaning that the editor itself also contains the text.
I feel conflicted with this.
While it says this:
>The OkayFreedom service saves neither addresses nor content accessed by the user, the IP address that OkayFreedom assigned to them; nor the user's own IP address through which they are using OkayFreedom. As a result, it is not possible for Steganos to ascertain the content an OkayFreedom user has accessed. Neither the IP address of the user nor that of the accessed servers are saved.
Later on it says this:
> We store user data on specially protected servers. Access is resticted to a few specially authorized persons.
I suggest emailing them to see what they mean with "we store user data".
This is an advent calender. so to get the coupons, just click today's date in the calendar and normally you have to give any email to get the activation code(if language is german just google translate it.). For today (december 12), the giveaway is Steganos Online Shield VPN. This giveaway goes on for the next few weeks.
Steganos don't work that way. Its much more believable they used Steganos to put messages into the images with passwords.
ELI5; Change the colors in an image ever so slightly that the ends of the binary create your message. This plus a proper password system would leave us in the dark.
I am using OkayFreeom about two months and it is pretty fine. Support service is a little bit slow though. Speed is also fine, with occassional slow downs. They also do not log, but they do not seem to be super crazy about privacy matters. I liked to use Steganos before and OkayFreedom is seem to be another good service of Steganos.
Drive to starbucks, log onto open wifi access point. turn on laptop, spoof mac address, turn on virutal machine, log into (i hope linux based VM), open TOR browser. Turn on Steganos and then turn on VM machine within machine, spook that IP and MAc address. Remote login from there to machine you have already targeted, from there use anatomizing client and TOR networks. Attack target. Did I mention since you were super paranoid you used a USB wireless card you bought from a second hand shop and once done smashed it to bits.
Steganos does not pass on personal user data to third parties unless the user has given his express prior consent or there is a legal obligation to do so
no ty.... that proves they keep logs... NEVER use vpns by 'security suite' software makers... omg.. biggest mistake a person can ever make.. you want a vpn... by a company that does one thing.... make vpns..
Hint 1: As the good people from the discord have found, if you put this picture of the logo of Steganos (-> Steganography) in you will get 0rPKTE2, which in turn corresponds to
Hint 2: How do you find stuff on a map?
Hint 3: AB=12
Hint 4: If only there was a way to measure the width and height of an image...
Hint 5: What if you looked at the pixel with width = 98 and height = 239?
I would like to thank Steganos Team for sponsoring this giveaway for Promo2day users
We have 5 premium licenses each is valid for 1 year and can be activated on 5 devices
Giveaway will end June 20, 2018
Бесплатная лицензия Steganos Online Shield VPN на один год для анонимного посещения сайтов в интернете, обхода блокировки сайтов, с защитой подключения методом шифрования:
I'm testing Cobbler, which is a nice minimal alternative to an encrypted Text zip. No temp files.
Another such tool is Steganos Locknote but it seems to be abandoned.
Our marketing manager was out sick when Ernesto sent out the request for comment to us. We are now listed on page 2. We are mistakenly listed as the 2nd Steganos post (we have submitted a correction request).
It's hard to say what is "bulletproof". Since every other day, some new document leak or experiment seems to imply that every hardware/software vendor is paid off to allow a backdoor or vulnerability in design to allow the NSA to break in. And even if there isn't a backdoor of some kind, having physical access to a protected file is half the battle.
Once they have it, it's only a matter of time before they crack it (assuming you have a weak password). Or a new technology is invented that takes a few days to crack a file when it took 30 years before said technology.
I'm no expert by any means. I am aware of the following: AxCrypt, Bitlocker, TrueCrypt, and Steganos VPN.
Any or all of those could be useless since a 3rd party hasn't audited them AFAIK. TC was raising $ to get approved by an auditor last time I checked.
Lifehacker always seems to have email/IM/Dropbox encryption tools every month. Again, nothing is guaranteed.
CNET did a giveaway of Steganos VPN keys.. Using Steganos I can torrent on campus at around 4Mbps. Good luck!
I've kept a journal since 2006, just text files in Notepad, encrypted with Steganos LockNote. It's a basic recap of each day, but it's extremely useful sometimes.