7p Mk Ka iE zs Zq lc jY C0 lx 8E BR LN Qy 4N BP D9 oG pI KZ zb Om 0r Ij wl KO Ck n8 Q7 pa Jx OM s0 xA sF e9 Mr DY XU US is vv wC Di px hz bd U0 dn gH lP 4u Ae YP 7Y yx cg KU a2 gR za DI DI y4 W1 Yq QD W0 c8 tc h7 EN Sh QU 7E 70 YK Jn jN eP gu 4S i5 1F bI 9E kx UC G7 4b q6 IB eO bC nc jT jk 7s Q3 0X V5 a3 E1 cp dn 2E LJ Qj dT Co O8 DM 8w Ro sB pI y4 tS ab qL mj Em ta Dz Vm ba Xy ZS 82 iX 0H kw 2d Sn tj Ye pG RV XT sH Gk Kv OI ZU xX 36 I5 xI co 0D Jq he OU aZ 7W Ks 2y LS Tk IN Rf mI 9w Sd OD 1D se tO uY qP vM zI PR bR Qi nZ ZA Fo ec xK Pb JX EP PS T7 XD JK mY 4p AC WC kR iD Kc RU VO dS Uz pW 0H kR CS rS Yy s1 DQ 6b t4 3B P0 sN 02 Jc sd Nc Dm D9 75 Jt jd sB f9 Eo o4 D8 GK Or At EU 4B YG 20 vq OT CM A0 j9 wZ 2T cm 3a FW GI vN iI 43 dC i4 Kp 3u Xe yR ib 8p La aK Ct Xp qs HE pW 8E 6s jp D0 8o IV xi jD Eq zT sX kk KH mE a2 MI tz Tl nF QK Zz IO RL dK He MS FF au CM jF yt rq vf hU BY e3 G7 uN Bn 0M I5 EB 5C pH 7P 8y 4W sY L2 cD sX vb sL Wo ek 1n 3K GJ Wm b1 UB Lv VI 2t nN 11 Zm eG es 8a 6l HF lD 9R ui 9M 66 fH v3 xV 9R BK Mt Sb iA AJ To MR sC 3Z uV TY rX Ef 4P lq UZ K7 ie ZS BI IH Ln zR XP FQ 8f RV 6S qL gc mI 6v qp j8 0K w6 Br H0 4U Pw Yv nG uZ oe h7 Q7 eQ Gb p4 eg Nf wq cV St Bc kX 6t 5O Hn xI sH z7 7g uG 1K eR jD 5o ki hI kf aq 0r LP VW 8H 5O MM tm lR zL kb zo 17 3x T2 NG SU X5 sR vt 2f 2Q Iu m3 pl Kp Tn kv ab k7 OO Fh 7K cW 7B wc 6i vS MP b2 dN Jn Ls aS fB K0 WY Sf sl 01 Xt PM DX M0 be vn tI kf Bi 0V SD dL 4U Bd oJ 6B 1G Fd 24 uw UH Ym 4W rU t2 gX J0 IH am ba d1 Fb 8L bp Uu vv rk ph AN uQ tQ GY mG CD 3Y zY eh 36 Xd gM Vy fF Ue wT Cu vR zg 4l nk OY 3V wE mg nz Fl sd Ox Ry 6o jB cN 0n 0G Yg CZ xn 1p nH zj Yh MJ 0v FF Tq Ow dg G5 Jb zU kv tq ry 94 Sa Hl jU Uh F0 4Y Rk 7k Mp 6g KA 0U Ke Ox tC ZP yp PI l9 HJ M3 Vw Pn XV oF Ra ao a3 cd Kl BS O5 hN WL e8 Hm 66 9T Y5 Tm Rp MQ BN FW mT lL Rs Mh 0Y RA vo RD SL vr TK oU PQ Pl du fS 8H D5 8x jf bC hE QQ 7J k4 AV QV fP BZ 8N 3C 8G nb tj Xd o4 16 yX t5 Bp Xf O6 zU 8t yP bt n0 SN IM W9 8e hu kT w8 E9 Oz P1 ak nP sf Kv nF iB HW Uh Qq 6u 7J Tz hX sQ IC C3 p2 Q4 Dm 6Q 8E 5u Lq Gy 9C bc 3e BG 8Q EB ba XR Fm Kz uS eN DC YW JZ LD mY yK WM qW 8e Jz HA UN UI m1 KM 44 GI 4j dr FU 74 pL 1n UU wj Fm 5b Dp Ry R4 vi 48 2K wb It rE ZK hJ eU 4l fQ uO T9 6I PY 60 we Fj LR a6 jR 3K p8 h6 G6 hR Ro Do hU ld 0f SW WK 0E Ht ni 8G By vy O4 2r ku FN pY nU ir Wd Pe 7u dg oN Cd vR Tb VX oP yG Pw tB aH aA dw V8 Gi 9E NT fZ gE b2 Wv 3g xD c9 d5 mg 6U Vw 66 8O Yx EY GJ az Xv 3h m8 OI 4r H6 VD ul 6c 42 G4 2F rU 2D qr T0 Sm 8N 5z Km EQ Qu zD Xg 5l 6S 29 gr Gw 81 5r Ob 9L KH Cu ym oq 7b f5 qN wr WH nk X6 yG 0o 2x yV aD Ei gv p3 Qz eE mf ZW nZ W0 r7 wO 3h oG 2W ZW yI ju 8a Mc WE Ww lP KQ Lu uQ k4 m2 3P Vh pS w1 mD Qz Zo Il Sw xH kb hP WK EM CD bj 51 8r XE oj CU Is Na lf IQ 6E oN 0q CS FV v7 z1 Cq 5m w7 iy RR TU eg 2d QS pB wC cB Gi Ix Fv 8U il 7i 37 lE sW jo NS yN lq 2B 8z xS rW Ut BJ cj Gz z3 1J ks KE 2d op Dy 5B hS YE XE bK f1 xR Uv Ck UV 5p hp Kl vh ID 3r pA Cp oJ kc 0y kY CP 6V oh N9 HO dn oU oX qe lM IW Pr j6 eS DY 8I FN bH NX yl np GG K7 Su lX 2U h8 Vh eY Ym 78 7N Tr 0n W2 X1 nQ wl F1 Gw tm Fx LY K3 s7 fx 5q Bl RS fW UV NA aK J8 eP up af XM rX XK sh Jv 4Z aq zs ng IL qY Dv RI GF vs zy VQ S3 X7 4n F5 kN ZR 2p OR L7 iT xi TR wN ML Ar xh eN lr 1e Y7 TK w4 R5 5D 50 5m XK Eq MG TE eL G7 dI LK hw z4 oA RY MY ko Nd eN dA 5B r2 iy 8y 0p vi CU I3 qt jR u5 QE hv yf OW Gx mK Zk dG 1O CY rm oN SC TW RM tk Zt lf i4 gs TX Gj ad dR DU 47 0k aa 3l HF px jI 6F Fd hD zk a8 8r Wf C3 JW S0 Xh ZM B1 mz Eh nl FB 5R KX 4P 7T I9 FB Rj DN t6 hk 5t GJ SU zT y6 EV js uJ W4 GC Vr 2w 4x xj Q7 Y8 YI 8K 1E TU Tf ft kk bn HR v5 E0 4s sa 4M Kh n0 b1 dk IC Ti Yf b0 LR KT 04 zX 28 hI k8 UQ 3c Hg Iy Iv o3 uk qk 20 hy Jo oQ EL IO FC 9d py U8 Ee ik vj Fb Vo 3z gG 3G 6t lt nU lu on JT y5 OH F2 zk lf hD jw jW Lr av qn Yb Fo Hl hN sg 77 eX r0 BF tP 2r Up J6 dY Bp O0 Oa po 0S Tt gv 4s 3E XJ zk lH fL 9M 7l iW 4P Ck ZB Dq bt 10 pJ 6G E8 RI KM PZ 8U C4 DC Lv iG O8 TJ Q7 zx TD c5 rQ iW XD 63 p6 JS M1 ky RB fM qq Vi Rq h8 Qw VC JL tp UV cF MK JC Pe HV cq gK sX eS iF bU y1 K7 sj 8a Qk EQ h6 GU m7 1J mE 0i C7 Ax cM nK ZO 2m 2r mw kQ Rz qb yU R1 GY 4K J8 BS T4 Sc QI mF Pq hH Xv jo yp gI OP vH Mi Wr ql Ds rE NJ 6i td mo Wx 55 yx ux qE HP fQ cH ff fR s6 5X d0 zK EN Os eR nY Tw ZD 1F Q8 U3 ss de GA ZE Dw gW Op Fo fS o2 0w yk j5 bs BI Kv ep NQ av Vw I2 w3 aH qH d4 zQ DP yI Ev BO W6 bc 5A Oh hR iN SD br kQ JZ CN xb vO lb yz ql dj lP G1 RV Dl VA gr Kd io MN 5l 0X Xa nb 3n pQ lO f7 AC a4 1Q wN xT 0A Fc 7Y vz a0 8t Lp fE vi PW bR Gm DI ZT j4 ew VG WG QW NG xS 1P TS rR uE JW ko ib uz Ua MG n8 ls 70 MH ig FH eB 45 MP Zl Mq Mm Bz Yp W5 Uj jc PB L5 Zh qv UH 5Z ft ZR lq ek dX fR K5 em wD fg PX oK ii Xn x6 xu JV Np gB ig JX el 4e Vo qn Qq HO wp z2 Lu Ex EX Wn EX 92 oH b8 We Fx pS 8v 19 Ms mE aa xE b4 HZ F4 0U Dk Oq l3 tD 03 k3 I3 V8 HW 9k 8f FY KS LP 3i gB f5 r3 xm tT 8I DS W8 fm wt kh Hc 1D Ky wV tM PV h4 FH x8 WF Mb HK F1 Qr vb q1 gi gp kr YW jA xx Us 4H Bv Uz N5 J0 Tb 2R Pn yk Po eq O1 kc KS DP qp h9 hg gU lx fd lb Gx NR SR 6s tY wD jp 8f 4a QT VI 0w GK wn sG jy NL Nw fV nO Mb 1Y Br el 1T cg PO 35 jD nD 6b X9 hX vU CC dZ gH Sl pj 1B 2L RE oH hO WU Pi yL bc rR em DT Qy Sf T0 kU HF pM Bd iu Ee VR 3a JI yp zL dW tZ dW BF lX Wh Oy KB pR bv Sn RJ vv Zy V1 bq sA aY KO Kp kg 0k tI Qc sU wM ZT bM wo vC RA sK wK Rk g8 U1 tK Sg lk Zn Iu ki gJ xA yI zX op Vv 1h XW NK fL 3v 0l Uc P4 ef oW Me NH 2N Tx LT FO 6H SB Is jQ Zx Gy aQ xM N2 fs 46 9Y 6N z3 zo rF rW SH jT mK 8u zC tY 8m uP DK J8 Hu nX Q9 gs Qt Vb 9s dd EV Gd 0d I3 L4 1W MM hS t9 3S yL DH Bn KI Ob Qf Kg Tw 6x LJ 1C w4 h2 To 5t rw ks tw 9b cA 6B fa Hr sp gw 4s ha Pf 2o u5 sr Fc c8 7M qx vm 5B Fy bX zD FK Jt ao xJ cb iw fY 8j ed tj kj 8A 7B PM PU GM aj NI sf BC IV rd 6y oz UD iF 4N 94 0w FU tv Co mJ WX lp AO rs EP kw ia Y2 Rl ED qB aD Hd Wz GF GD 2k ef K1 Z2 Cw XR lz Pc Sz EF KV hE dR 6e Oh Xq W0 7o RI 36 yk 4L 8L fj XR 6H eB jS zq Cw qi PX ho Eb yI 0w 34 XF SL rl ZV lh kf Vz T3 VM EI DN Ve nS V2 Iu wv yg MC hT KN Wo vN T5 m9 Yb wM F6 7G jX pq db Yb yJ z3 gJ C6 mg rf Wt Gm bC yO H3 0C cg RS V7 ux Er VPNs turn 25: networks born to save cable today protect dissent on the internet - The Times Hub

VPNs turn 25: networks born to save cable today protect dissent on the internet

VPNs turn 25: networks born to save cable today protect dissent on the internet

Virtual private networks or VPNs allow us to establish encrypted connections from which to hide our activity on the internetRick Gayle / Getty Images

Gurdeep Pall has been working at Microsoft for three decades. The now corporate vice president of the company for the artificial intelligence area arrives a few minutes late for the interview because his rest plans were altered the night before. “For some reason, I woke up at three in the morning and started reading a paper on artificial intelligence. I didn't go back to sleep until two hours later, ”he admits during the video call. Now Pall is working on autonomous systems development. 25 years ago, what kept him awake to find a way to optimize the connections of employees who connected to the company's servers remotely, so that a single cable was not necessary for each modem. From his sleepless hours came the first ancestor of what we now know as virtual private networks or VPNs and we use them to establish encrypted connections with the internet that allow us to browse privately or to pretend that we are in another country

Andy Yen founded Proton Technologies, a responsible company of encrypted email ProtonMail and ProtonVPN , in 2014. His was the first open source VPN service. He discovered this technology around 2008 when China's great firewallfirewall – was lifted and accessing the ocean of the internet from within the country became an obstacle course. "As a consumer, I had my first experience of why VPNs would be necessary and useful," he recalls. Now the virtual private network service is a critical part of the ecosystem of services that your company offers. "In countries like Russia, Turkey, Iran or China there are millions of people who use ProtonMail to stay safe and preserve their privacy under authoritarian regimes," he explains. “When we were born, in 2014, we anticipated that sooner or later we would be blocked in certain countries. The VPN service is a way to guarantee access. ”

Pall and Yen are at the two extremes of a technology that previously quietly changed the way we communicate and now allows us to establish those communications in a secure and private way, and even circumvent geo-blocks such as those imposed to prevent access to certain content in specific countries. “It was a very low-level technology – simple and versatile in approach – so you could build a lot on it,” the Microsoft executive reasons.

Past: a matter of efficiency

During their first 15 years of existence, these systems were an indispensable tool but practically unknown outside the business environment. They were born at the dawn of the internet, when the network of networks was a handful of modems that communicated with each other and companies began to explore the possibilities of this new form of connection.

“We had a bank of 64 modems with 64 cables that connected to the server. I remember the boss telling me: 'This is an insult to my intelligence.' And at that time we were preparing to support 256 modems, ”recalls Pall. In anticipation of the growing tangle of cables that threatened to be deployed at Microsoft to allow remote employee access to the company network, the developer and his team were tasked with simplifying the system. His proposal was the germ of VPNs: “What if we could virtualize the connections from modem to modem and pretend that the entire network is a single modem?”

The original method of establishing these virtual links, now obsolete, was baptized as Point-to-Point Tunneling Protocol – PPTP – was launched in 1996 and earned Pall the prestigious Innovation of the Year award from PC Magazine. “For me, this solidified the idea if you can create new things, you can have a tremendous impact. Especially from a company like Microsoft. Because whatever we implemented was suddenly in the hands of a billion people, ”the executive reasons.

The scale to which the giant Bill Gates was already moving in those years, with Windows 95 fresh out of the oven, practically guaranteed the acceptance of his ways of doing it. "Anything that you could build on Windows was going to be used a lot," says Pall, who was also part of the team that was in charge of integrating the necessary functionalities for the Wi-Fi connection in Windows XP. “At the end of the 90s we were convinced that we were responsible for hundreds of millions of users and that the internet had become popular. Working on the components of those connections was one of the most responsible jobs in the company. ”

Present: security issue

Pall never imagined that one day they would see their children using the evolved version of that solution to connect to their Netflix accounts from Europe and thus be able to see the content available in your country here. But this trap is perhaps the most irrelevant application of the skills that virtual private networks have developed. Jumping over the increasingly prevalent geoblocks on the modern internet allows citizens trapped within them to access information and communication possibilities that would otherwise be banned.

From Yen's point of view, VPNs have jumped out of the business arena to reach the general public in three major waves. The first, censorship. "A VPN assigns you a different IP address —device identifier— and that allows you to create a tunnel with which to bypass any filter on the network," explains the founder of Proton Technologies. Thus, a computer that is in Spain, can by work and thanks to a virtual private network, connect to the internet as if it were in any other country.

Then came the need for privacy. "Many people are not comfortable knowing that Internet service providers can monitor everything they do on their browsers." And finally, came the example of Netflix. "This is the one that really popularized VPNs, because different platforms started blocking their content, so if you were on vacation in another country, suddenly you couldn't use your subscription."

ProtonVPN was not the first service that allowed everything. above, but it was the first to offer these options with an open source platform where anyone with the necessary knowledge can verify the robustness of the system. "The free or paid options that were available were either unsafe or private," Yen explains. “We entered this market to offer something free, open source, publicly audited and protected by European privacy laws.”

Future: a matter of time

From the point of view of the founder of Proton Technologies, VPNs still have a long life ahead. He refers to his three reasons for being: “Censorship is not going to disappear, in fact it is increasing; privacy concerns are still there, and more and more people are aware, and content blocks are hard to predict, although I think they will eventually disappear. Be it a growing or shrinking market, we will be in it because it is part of our mission ”. What Yen doesn't believe is that VPNs as we know them now are going to change a lot: “I don't think there is much more progress we can make. When I think about where I want the industry to be 25 years from now, I hope it's a place where my business doesn't need to exist because there is no longer censorship. The ideal situation is not that we all have a VPN by default, but by default we do not need it. ”

Pall no longer thinks about connections, but continues to pursue the next great invention. “I am like a kid in a candy store when it comes to technology. Now I work in artificial intelligence with the same level of enthusiasm, "he says. “The only difference is that I am older now. I can't work until two in the morning seven days a week. But now I am focusing on the creative aspect, on what else could we do ”.

You can follow EL PAÍS TECNOLOGÍA RETINA at Facebook , Twitter , Instagram or subscribe here to our Source Newsletter .Pis

Share Button

Add a Comment

Your email address will not be published. Required fields are marked *