Question

Is softether vpn client safe for Cyberroam bypass?

Guys I have been using Digital Ocean server as VPN through Softether VPN Client software for quiet a time. Before that I used couple other paid VPNs which were more or less good for bypassing my college blockage on certain sites. Recently the college ISP did a clean sweep and banned my account along with hundreds of student account for ‘illegal activities’. Our internet is monitored and protected by Cyberroam. This is my first time I ever got caught for this kind of activity as I always used VPN to protect my ass. I dunno how I they traced my IP to ban my account or they just closed it on large amount of data transfer through my account but this thing is questioning my trust on VPN. I gave my login credentials to a friend and went out of time and came back to find out my account was deactivated. He said he accessed some porn sites but didn’t use my VPN (he didn’t know how to use it). So that could be the reason but still I am not comfortable using the VPN right now. Need advice! TL;DR Got my login credentials blocked and got them back unblocked a while back. Too scared to get the vpn running. Laying low for now.


Submit an answer


This textbox defaults to using Markdown to format your answer.

You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!

Sign In or Sign Up to Answer

These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

jarland
DigitalOcean Employee
DigitalOcean Employee badge
December 6, 2018
Accepted Answer

Hey friend,

No one can say for sure without knowing a lot of details from your side (and honestly, I’m not even sure what all details to ask for), but what you’re basically asking is whether or not your VPN connection is secure in transit. SoftEther uses multiple protocols, some safer than others. You might read up on the documentation of the protocol you’ve selected.

I could spend hours talking about man in the middle attacks and theories about how you might be safe or not safe, how someone might intercept your traffic, etc. My honest opinion though, your college IT department probably doesn’t consist of the world’s top end hackers, or even people who have the time to spend thoroughly investigating every student’s protocols to find weak points for exploitation. If I had to guess, I’d say you were probably an easy target for high data transfer and all of it routing to a single datacenter IP address.

Jarland

Try DigitalOcean for free

Click below to sign up and get $200 of credit to try our products over 60 days!

Sign up

Become a contributor for community

Get paid to write technical tutorials and select a tech-focused charity to receive a matching donation.

DigitalOcean Documentation

Full documentation for every DigitalOcean product.

Resources for startups and SMBs

The Wave has everything you need to know about building a business, from raising funding to marketing your product.

Get our newsletter

Stay up to date by signing up for DigitalOcean’s Infrastructure as a Newsletter.

New accounts only. By submitting your email you agree to our Privacy Policy

The developer cloud

Scale up as you grow — whether you're running one virtual machine or ten thousand.

Get started for free

Sign up and get $200 in credit for your first 60 days with DigitalOcean.*

*This promotional offer applies to new accounts only.