VPNs aren't broken – TunnelVision attack is being sensationalized (2024)

VPNs aren't broken – TunnelVision attack is being sensationalized (1)

You may have seen the rumblings about TunnelVision supposedly neutering even the best VPNs. When I first read about it, even I was worried. However, after speaking with VPN and cybersecurity experts, I've realized it's nothing more than sensationalism.

Because this technique has been a possibility for over two decades, it caused an immediate ripple of panic in the industry. VPN users everywhere stopped momentarily, horrified that they might've been acting under a false sense of security.

Let me show you why TunnelVision isn't something you should be worried about and, while problematic, it's pointless trying to use it.

VPN expert and digital privacy advocate

VPNs aren't broken – TunnelVision attack is being sensationalized (2)

VPN expert and digital privacy advocate

Andreas Theodorou

I've been researching VPNs for years, and spend every day testing them, trying to break them, and working with any VPN service that's willing to hear my criticisms. I advocate for digital privacy and better security—all while holding the industry accountable for its actions.

What is TunnelVision?

In a blog post from Leviathan Security Group, TunnelVision is described as a "network technique that bypasses VPN encapsulation" by using an operating system's dynamic host configuration protocol (DHCP).

As Dr Peter Membrey (Chief Engineering Officer at ExpressVPN) explained to me: "Part of this configuration is to tell your device exactly where it should send traffic so that it can reach the internet. There's a lesser-known DHCP feature, however, called Option 121, which enables setting alternative routes for specific destinations—say, the IP addresses that hostwww.google.com."

He continued, "Any device that supports Option 121 has the potential to have these additional gateways added, diverting the traffic that otherwise would follow the default path."

The problem with TunnelVision

Personally, I draw issue with the way TunnelVision has been represented. I disagree with Leviathan describing it as "decloaking" because only the TLS headers are revealed. If you're using a VPN, the contents of your data packet are still encrypted, because that's done at the device level before it goes out through the network.

TunnelVision isn't decloaking, it's rerouting—there's a difference.

Dr Membrey explained that "[Leviathan] have used the word decloaking, but that term means something very specific. Most people associate the term cloaking with a cloaking device, something found in the Star Trek universe. Decloaking a cloaked ship would mean that you had found a way to take a ship that was invisible, and render it visible.

"In the case of TunnelVision, the traffic was simply routed outside of the tunnel. You can't decloak it, because it was never cloaked in the first place. That's like saying you decloaked a ship because you turned around and saw it sitting there. In both cases it is very unpleasant, but neither qualify as decloaking."

Does TunnelVision affect all devices?

Thankfully, no. Android devices don't have option 121 available in their OS. Similarly, iOS has limitations that also protect against this, so if you're on iPhone or Android, you should be safe.

In other words, you can't decloak what was never cloaked in the first place. Even if someone were to execute this attack against a person using VPN obfuscation (hiding the fact you're using a VPN), it would only come close to decloaking if you were using a sub-par VPN that wasn't doing its obfuscation properly.

Ultimately, there are so many protections in place at a network and device level, so as long as you're using a secure VPN, you'll be fine. This emphasizes the need to avoid VPN services that haven't proven their security.

What's more, when you use TunnelVision, it's immediately apparent that you're doing it. Think of it like a burglar driving a car through your front door instead of trying to pick the lock. Any hacker with an ounce of intelligence wouldn't want you knowing that they're there—so they wouldn't use such an obvious method to get the same data they could obtain perfectly silently through something like forced type 2 DNS leaks, identified by ExpressVPN in a recent paper.

If someone were to execute a TunnelVision attack, it would definitely be a problem, and the information gathered could be used as part of a wider correlation attack to identify you. However, it would take a significant amount of data to do that, and you'd likely be protected by the kill switch beforehand.

What the experts say

Don't just take my word for it, though. Listen to what experts in the industry had to say about the matter:

A world-leading VPN expert and security advocate

VPNs aren't broken – TunnelVision attack is being sensationalized (3)

A world-leading VPN expert and security advocate

Dr Peter Membrey

"Pulling off the attack is not as trivial as has been described, and while it isn’t as difficult as making a cloaking device, it isn’t as simple as pushing a button either. There are a number of things that must align for an attack to be effective. For example, this attack can only really be carried out on public, open WiFi networks. If you’re on a trusted home or office network, you’re not going to be vulnerable. There are also protections that a public Wi-Fi provider can put in place to prevent these attacks being effective as well."

Find out more in ExpressVPN's assessment of TunnelVision.

Co-Chair of the VPN Trust Initiative (VTI)

VPNs aren't broken – TunnelVision attack is being sensationalized (4)

Co-Chair of the VPN Trust Initiative (VTI)

Lauren Hendry Parsons

"To put this very simply: this has been seriously overinflated. If you're at home and no one has hacked your router, you're safe. If you're connecting by cellular network and not anyone else's Wi-Fi, you're safe. If the Wi-Fi network you're joining is not controlled by a malicious actor, you're safe. If you're on a laptop and your kill switch is on, you're safe. And so on. In practice, it takes quite a combination of factors, all existing simultaneously, for this issue to present any risk at all."

VPNs aren't broken – TunnelVision attack is being sensationalized (5)

Sam Dawson

"It's an interesting use of DHCP, but it doesn't fundamentally undermine how VPNs work. You're only vulnerable to this attack on public WiFi networks where an attacker either owns the router or can spoof the DHCP responses. Your VPN provider also most likely uses a firewall to stop traffic going outside of the VPN route anyway, so introducing a new route would just knock you offline. Frankly, I think the coverage is a little overblown—this discovery doesn't mean VPNs are useless at all, it just introduces a new threat that has to be taken into account. I think what Leviathan's research does do is widen the security gap between poorly-engineered VPNs and robust VPNs with multiple failsafes and fallbacks."

How to protect yourself against TunnelVision

It's really easy to defend against TunnelVision, and plenty of protections are already in place to keep you safe. Any VPN with a decent kill switch will be able to detect that the traffic isn't going through the VPN network and cut your internet immediately.

If you want a VPN that won't let you down, check out my top three picks below. Take advantage of their money-back guarantees to get three months of free VPN coverage without risking a penny.

1. NordVPN: the best VPN overall
NordVPN beats all other providers hands-down. It's reliable, secure, and always expanding its toolbelt. On top of that, it's budget-friendly, coming in at around $3 per month. See for yourself with a 30-day money-back guarantee and put my favorite VPN through its paces.

View Deal

VPNs aren't broken – TunnelVision attack is being sensationalized (7)

2. ExpressVPN: the best for beginners
If you just want an app that'll do everything for you, ExpressVPN has the simplest apps. Express automates all of the configuration, so you get the fastest, most secure connection without having to manually configure anything. While it's twice the price of NordVPN, you can try it with a 30-day money-back guarantee to see how it compares.

3. Surfshark: the best cheap VPN
Don't let the price tag fool you. Surfshark is fast, secure, and every bit as good as NordVPN and ExpressVPN—all for less than $2.50. If you're on a budget, make the most of its unlimited simultaneous connections to protect every device you own—all with a 30-day money-back guarantee to fall back on.

View Deal

Bottom line: don't worry about TunnelVision

There are so many circ*mstances that need to align for TunnelVision to genuinely be a threat, and with modern TLS protections, it just isn't as dangerous now as it could've been back in the days when Secure Socket Layer (SSL) encryption was the standard for web protection.

That's not to say it isn't a problem if it happens, but there are just so many reasons not to do it, that it's not worth all of the sensationalism that has been put out there.

Get daily insight, inspiration and deals in your inbox

Get the hottest deals available in your inbox plus news, reviews, opinion, analysis and more from the TechRadar team.

VPNs aren't broken – TunnelVision attack is being sensationalized (9)

Andreas Theodorou

Editor-in-Chief of Tech Software

Andreas has been with TechRadar as Future PLC's Editor-in-Chief of Tech Software since March 2023, supporting content and teams on VPNs, antivirus, and other cybersecurity tools. He's previously written for and led content at ProPrivacy, Business2Community, and The Tech Report. After completing a Master of Research degree, Andreas fell in love with all things cybersecurity; combining his passions to help expose the prevalence of ad tech in the charity sector and raise awareness of digital privacy around the world.

With contributions from

  • Sam DawsonVPN and cybersecurity expert

More about vpn

Norway tells businesses to replace their SSL VPNFrench Tiktok ban makes VPN usage soar in New Caledonia

Latest

Track and share your activities like an absolute boss with this free app
See more latest►

Most Popular
Nearly half of all Steam users are using Windows 11 — but why?
Star Wars should learn from Andor and stop making Disney Plus shows that are so obsessed with the Jedi
Microsoft should accept that it's time to give up on Windows 11 and throw everything at Windows 12
I love my iPad – but these 5 upgrades would make me drop it for the new one
Star Wars: Skeleton Crew isn't out on Disney Plus yet, but it's already got a lot of convincing to do
The Arc browser just launched and yes, it really is that good
Qualcomm’s new Snapdragon X Elite chips could mean better laptop battery life than ever before - but one thing worries me about these new processors
I switched through all the best music streamers for a month to compare them – here are the 7 biggest things I learned
So what if OpenAI Sora didn't create the mind-blowing Balloon Head video without assistance – I still think it's incredible
Windows 11 laptops could finally take on M3 MacBooks thanks to Qualcomm – but Microsoft needs to do its part too
Bing blew up last year but it's still miles behind Google
VPNs aren't broken – TunnelVision attack is being sensationalized (2024)

FAQs

VPNs aren't broken – TunnelVision attack is being sensationalized? ›

VPNs aren't broken – TunnelVision attack is being sensationalized. Experts agree that TunnelVision is being over-inflated. You may have seen the rumblings about TunnelVision supposedly neutering even the best VPNs.

What is tunnel vision VPN? ›

The technique behind TunnelVision isn't new either; it's been a possibility for over two decades now. It involves rerouting network traffic using a lesser-known feature of the dynamic host configuration protocol (DHCP). This rerouting diverts traffic outside the secure VPN tunnel.

What is a VPN connection? ›

A VPN, which stands for virtual private network, establishes a digital connection between your computer and a remote server owned by a VPN provider, creating a point-to-point tunnel that encrypts your personal data, masks your IP address, and lets you sidestep website blocks and firewalls on the internet.

What is the TunnelVision VPN flaw? ›

The vulnerability exploits the DHCP server to manipulate network traffic, allowing attackers to bypass the security measures of most VPNs. While Linux remains largely unaffected, other operating systems like Windows and macOS are vulnerable.

What is the difference between a tunnel and a VPN? ›

A VPN is a secure, encrypted connection over a publicly shared network. Tunneling is the process by which VPN packets reach their intended destination, which is typically a private network.

Can someone connect to my VPN? ›

You can't be tracked using a VPN because it encrypts your data. As a result, your ISP or bad actors can't get any information out of your traffic. They only see the VPN server's IP address (e.g. if you're connected to a US server, the US IP address is visible), while your real IP and online activities stay hidden.

Should I allow VPN on or off? ›

Should I leave my VPN on all the time? Yes, you should leave your VPN on all the time. VPNs offer the best online security, so keeping it on will protect you against data leaks and cyberattacks, especially while you're using public Wi-Fi. It can also safeguard against intrusive snoopers such as ISPs or advertisers.

What does VPN protect you from? ›

A VPN creates a secure tunnel between a user's computer and the VPN server, which hides their online activity and location. VPN security enables users to protect their online privacy and prevent their internet service provider (ISP) from tracking their browsing activity.

What is the purpose of a VPN tunnel? ›

A VPN tunnel not only protects you from data being intercepted, but it also hides your IP address, which can otherwise be used to identify you when you are browsing the web. Instead of your real location, the sites you visit will only see the location of the VPN server you are connected to.

What does tunnel vision do? ›

Tunnel vision is another name for peripheral vision loss. It makes it hard or impossible to see objects that aren't directly in front of you. It can be temporary, but it might also permanently change your vision depending on what causes it.

Is tunnel VPN good? ›

TunnelBear is a great choice if you're looking for an affordable VPN that'll keep your data safe while you're coming and going online — if you're looking to stream Netflix from other countries, though, you might run into some snags with Tunnelbear. So if you're media-minded, check out these three options below.

Is VPN tunnel app safe? ›

Conclusion. A VPN tunnel is a secure and encrypted connection that can improve user security, privacy and access. By routing all internet traffic through the VPN tunnel, users can enjoy a more private and secure online experience while also being able to access content that may be blocked or restricted in their region.

Top Articles
Latest Posts
Article information

Author: Rob Wisoky

Last Updated:

Views: 6766

Rating: 4.8 / 5 (48 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Rob Wisoky

Birthday: 1994-09-30

Address: 5789 Michel Vista, West Domenic, OR 80464-9452

Phone: +97313824072371

Job: Education Orchestrator

Hobby: Lockpicking, Crocheting, Baton twirling, Video gaming, Jogging, Whittling, Model building

Introduction: My name is Rob Wisoky, I am a smiling, helpful, encouraging, zealous, energetic, faithful, fantastic person who loves writing and wants to share my knowledge and understanding with you.