Question

Is softether vpn client safe for Cyberroam bypass?

Guys I have been using Digital Ocean server as VPN through Softether VPN Client software for quiet a time. Before that I used couple other paid VPNs which were more or less good for bypassing my college blockage on certain sites. Recently the college ISP did a clean sweep and banned my account along with hundreds of student account for ‘illegal activities’. Our internet is monitored and protected by Cyberroam. This is my first time I ever got caught for this kind of activity as I always used VPN to protect my ass. I dunno how I they traced my IP to ban my account or they just closed it on large amount of data transfer through my account but this thing is questioning my trust on VPN. I gave my login credentials to a friend and went out of time and came back to find out my account was deactivated. He said he accessed some porn sites but didn’t use my VPN (he didn’t know how to use it). So that could be the reason but still I am not comfortable using the VPN right now. Need advice! TL;DR Got my login credentials blocked and got them back unblocked a while back. Too scared to get the vpn running. Laying low for now.


Submit an answer


This textbox defaults to using Markdown to format your answer.

You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!

Sign In or Sign Up to Answer

These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

jarland
DigitalOcean Employee
DigitalOcean Employee badge
December 6, 2018
Accepted Answer

Hey friend,

No one can say for sure without knowing a lot of details from your side (and honestly, I’m not even sure what all details to ask for), but what you’re basically asking is whether or not your VPN connection is secure in transit. SoftEther uses multiple protocols, some safer than others. You might read up on the documentation of the protocol you’ve selected.

I could spend hours talking about man in the middle attacks and theories about how you might be safe or not safe, how someone might intercept your traffic, etc. My honest opinion though, your college IT department probably doesn’t consist of the world’s top end hackers, or even people who have the time to spend thoroughly investigating every student’s protocols to find weak points for exploitation. If I had to guess, I’d say you were probably an easy target for high data transfer and all of it routing to a single datacenter IP address.

Jarland

Try DigitalOcean for free

Click below to sign up and get $200 of credit to try our products over 60 days!

Sign up

Get our biweekly newsletter

Sign up for Infrastructure as a Newsletter.

Hollie's Hub for Good

Working on improving health and education, reducing inequality, and spurring economic growth? We'd like to help.

Become a contributor

Get paid to write technical tutorials and select a tech-focused charity to receive a matching donation.

Welcome to the developer cloud

DigitalOcean makes it simple to launch in the cloud and scale up as you grow — whether you're running one virtual machine or ten thousand.

Learn more
DigitalOcean Cloud Control Panel